Search results for: and User Acceptance of Information Technology. MIS Quarterly
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 17837

Search results for: and User Acceptance of Information Technology. MIS Quarterly

17687 Enhancing Human Mobility Exoskeleton Comfort Using Admittance Controller

Authors: Alexandre Rabaseda, Emelie Seguin, Marc Doumit

Abstract:

Human mobility exoskeletons have been in development for several years and are becoming increasingly efficient. Unfortunately, user comfort was not always a priority design criterion throughout their development. To further improve this technology, exoskeletons should operate and deliver assistance without causing discomfort to the user. For this, improvements are necessary from an ergonomic point of view. The device’s control method is important when endeavoring to enhance user comfort. Exoskeleton or rehabilitation device controllers use methods of control called interaction controls (admittance and impedance controls). This paper proposes an extended version of an admittance controller to enhance user comfort. The control method used consists of adding an inner loop that is controlled by a proportional-integral-derivative (PID) controller. This allows the interaction force to be kept as close as possible to the desired force trajectory. The force-tracking admittance controller modifies the actuation force of the system in order to follow both the desired motion trajectory and the desired relative force between the user and the exoskeleton.

Keywords: mobility assistive device, exoskeleton, force-tracking admittance controller, user comfort

Procedia PDF Downloads 133
17686 Time Truncated Group Acceptance Sampling Plans for Exponentiated Half Logistic Distribution

Authors: Srinivasa Rao Gadde

Abstract:

In this article, we considered a group acceptance sampling plans for exponentiated half logistic distribution when the life-test is truncated at a pre-specified time. It is assumed that the index parameter of the exponentiated half logistic distribution is known. The design parameters such as the number of groups and the acceptance number are obtained by satisfying the producer’s and consumer’s risks at the specified quality levels in terms of medians and 10th percentiles under the assumption that the termination time and the number of items in each group are pre-fixed. Finally, an example is given to illustration the methodology.

Keywords: group acceptance sampling plan, operating characteristic, consumer and producer’s risks, truncated life-test

Procedia PDF Downloads 317
17685 Outline of a Technique for the Recommendation of Tourism Products in Cuba Using GIS

Authors: Jesse D. Cano, Marlon J. Remedios

Abstract:

Cuban tourism has developed so much in the last 30 years to the point of becoming one of the engines of the Cuban economy. With such a development, Cuban companies opting for e-tourism as a way to publicize their products and attract customers has also grown. Despite this fact, the majority of Cuban tourism-themed websites simply provide information on the different products and services they offer which results in many cases, in the user getting overwhelmed with the amount of information available which results in the user abandoning the search before he can find a product that fits his needs. Customization has been recognized as a critical factor for successful electronic tourism business and the use of recommender systems is the best approach to address the problem of personalization. This paper aims to outline a preliminary technique to obtain predictions about which products a particular user would give a better evaluation; these products would be those which the website would show in the first place. To achieve this, the theoretical elements of the Cuban tourism environment are discussed; recommendation systems and geographic information systems as tools for information representation are also discussed. Finally, for each structural component identified, we define a set of rules that allows obtaining an electronic tourism system that handles the personalization of the service provided effectively.

Keywords: geographic information system, technique, tourism products, recommendation

Procedia PDF Downloads 489
17684 Vocational and Technical Educators’ Acceptance and Use of Digital Learning Environments Beyond Working Hours: Implications for Work-Life Balance and the Role of Integration Preference

Authors: Jacinta Ifeoma Obidile

Abstract:

Teachers (vocational and technical educators inclusive) use Information and Communications Technology (ICT) for tasks outside of their normal working hours. This expansion of work duties to non-work time challenges their work-life balance. However, there has been inconsistency in the results on how these relationships correlate. This, therefore, calls for further research studies to examine the moderating mechanisms of such relationships. The present study, therefore, ascertained how vocational and technical educators’ technology acceptance relates to their work-related ICT use beyond their working hours and work-life balance, as well as how their integration affects these relationships. The population of the study comprised 320 Vocational and Technical Educators from the Southeast geopolitical zone of Nigeria. Data were collected from the respondents using the structured questionnaire. The questionnaire was validated by three experts. The reliability of the study was conducted using 20 vocational and technical educators from the South who were not part of the population. The overall reliability coefficient of 0.81 was established using Cronbach’s alpha method. The data collected was analyzed using Structural equation modeling. Findings, among others, revealed that vocational and technical educators’ work-life balance was mediated by increased digital learning environment use after work hours, although reduced by social influence.

Keywords: vocational and technical educators, digital learning environment, working hours, work-life balance, integration preference

Procedia PDF Downloads 37
17683 Integrating Data Mining with Case-Based Reasoning for Diagnosing Sorghum Anthracnose

Authors: Mariamawit T. Belete

Abstract:

Cereal production and marketing are the means of livelihood for millions of households in Ethiopia. However, cereal production is constrained by technical and socio-economic factors. Among the technical factors, cereal crop diseases are the major contributing factors to the low yield. The aim of this research is to develop an integration of data mining and knowledge based system for sorghum anthracnose disease diagnosis that assists agriculture experts and development agents to make timely decisions. Anthracnose diagnosing systems gather information from Melkassa agricultural research center and attempt to score anthracnose severity scale. Empirical research is designed for data exploration, modeling, and confirmatory procedures for testing hypothesis and prediction to draw a sound conclusion. WEKA (Waikato Environment for Knowledge Analysis) was employed for the modeling. Knowledge based system has come across a variety of approaches based on the knowledge representation method; case-based reasoning (CBR) is one of the popular approaches used in knowledge-based system. CBR is a problem solving strategy that uses previous cases to solve new problems. The system utilizes hidden knowledge extracted by employing clustering algorithms, specifically K-means clustering from sampled anthracnose dataset. Clustered cases with centroid value are mapped to jCOLIBRI, and then the integrator application is created using NetBeans with JDK 8.0.2. The important part of a case based reasoning model includes case retrieval; the similarity measuring stage, reuse; which allows domain expert to transfer retrieval case solution to suit for the current case, revise; to test the solution, and retain to store the confirmed solution to the case base for future use. Evaluation of the system was done for both system performance and user acceptance. For testing the prototype, seven test cases were used. Experimental result shows that the system achieves an average precision and recall values of 70% and 83%, respectively. User acceptance testing also performed by involving five domain experts, and an average of 83% acceptance is achieved. Although the result of this study is promising, however, further study should be done an investigation on hybrid approach such as rule based reasoning, and pictorial retrieval process are recommended.

Keywords: sorghum anthracnose, data mining, case based reasoning, integration

Procedia PDF Downloads 67
17682 Customer Relationship Management: An Essential Tool for Librarians

Authors: Pushkar Lal Sharma, Sanjana Singh, Umesh Kumar Sahu

Abstract:

This paper helps to understand the need of Customer Relationship Management in Libraries and why Librarians should implement the marketing concept of Customer Relationship Management in their libraries. As like any industry, libraries too face growing challenges to continuously meet customer expectations, and attract and retain users in light of overflowing competition. The ability to understand customers, build relationships and market diverse services is essential when considering ways to expand service offerings and improve Return on Investment. Since Library is service oriented Enterprise, hence the Customer/User/ Reader/Patron are the most important element of Library & Information System to whom and for whom library offers various services. How to provide better and most efficient services to its users is the main concern of every Library & Information centre in the present era. The basic difference between Business Enterprise and Library Information System is that ‘in Business System ‘the efficiency is measured in terms of ’profit’ or ‘monetary gains’; whereas in a Library & Information System, the efficiency is measured in terms of ‘services’ and therefore the goals that are set in Business Enterprise are’ profit oriented’ whereas goals set in the Library & Information Centre are ‘Service-oriented’. With the explosion of information and advancement of technology readers have so many choices to get information rather than visiting a library. Everything is available at the click of a mouse, library customers have become more knowledgeable and demanding in an era marked by abundance of information resources and services. With this explosion of information in every field of knowledge and choice in selection of service, satisfying user has become a challenge now a day for libraries. Accordingly, Libraries have to build good relationship with its users by adopting Customer relationship Management. CRM refers to the methods and tools which help an organization to manage its relationship with its customers in an organized way. The Customer Relationship Management (CRM) combines business strategy and technology to identify, acquire and retain good customer relationship. The goal of CRM is to optimize management of customer information needs & interests and increase customer satisfaction and loyalty. Implementing CRM in Libraries can improve customer data and process management, customer loyalty, retention and satisfaction.

Keywords: customer relationship management, CRM, CRM tools, customer satisfaction

Procedia PDF Downloads 50
17681 User Intention Generation with Large Language Models Using Chain-of-Thought Prompting Title

Authors: Gangmin Li, Fan Yang

Abstract:

Personalized recommendation is crucial for any recommendation system. One of the techniques for personalized recommendation is to identify the intention. Traditional user intention identification uses the user’s selection when facing multiple items. This modeling relies primarily on historical behaviour data resulting in challenges such as the cold start, unintended choice, and failure to capture intention when items are new. Motivated by recent advancements in Large Language Models (LLMs) like ChatGPT, we present an approach for user intention identification by embracing LLMs with Chain-of-Thought (CoT) prompting. We use the initial user profile as input to LLMs and design a collection of prompts to align the LLM's response through various recommendation tasks encompassing rating prediction, search and browse history, user clarification, etc. Our tests on real-world datasets demonstrate the improvements in recommendation by explicit user intention identification and, with that intention, merged into a user model.

Keywords: personalized recommendation, generative user modelling, user intention identification, large language models, chain-of-thought prompting

Procedia PDF Downloads 26
17680 A Case Study on the Impact of Technology Readiness in a Department of Clinical Nurses

Authors: Julie Delany

Abstract:

To thrive in today’s digital climate, it is vital that organisations adopt new technology and prepare for rising digital trends. This proves more difficult in government where, traditionally, people lack change readiness. While individuals may have a desire to work smarter, this does not necessarily mean embracing technology. This paper discusses the rollout of an application into a small department of highly experienced nurses. The goal was to both streamline the department's workflow and provide a platform for gathering essential business metrics. The biggest challenges were adoption and motivating the nurses to change their routines and learn new computer skills. Two-thirds struggled with the change, and as a result, some jeopardised the validity of the business metrics. In conclusion, there are lessons learned and recommendations for similar projects.

Keywords: change ready, information technology, end-user, iterative method, rollout plan, data analytics

Procedia PDF Downloads 121
17679 Insights into the Perception of Sustainable Technology Adoption among Malaysian Small and Medium-Sized Enterprises

Authors: Majharul Talukder, Ali Quazi

Abstract:

The use of sustainable technology is being increasingly driven by the demand for saving resources, long-term cost savings, and protecting the environment. A transitional economy such as Malaysia is an example where traditional technologies are being replaced by sustainable ones. The antecedents that are driving Malaysian SMEs to integrate sustainable technology into their business operations have not been well researched. This paper addresses this gap in our knowledge through an examination of attitudes and ethics as antecedents of acceptance of sustainable technology among Malaysian SMEs. The database comprised 322 responses that were analysed using the PLS-SEM path algorithm. Results indicated that effective and altruism attitudes have high predictive ability for the usage of sustainable technology in Malaysian SMEs. This paper identifies the implications of the findings, along with the major limitations of the research and explores future areas of research in this field.

Keywords: sustainable technology, innovation management, Malaysian SMEs, organizational attitudes and ethical belief

Procedia PDF Downloads 309
17678 A Method and System for Secure Authentication Using One Time QR Code

Authors: Divyans Mahansaria

Abstract:

User authentication is an important security measure for protecting confidential data and systems. However, the vulnerability while authenticating into a system has significantly increased. Thus, necessary mechanisms must be deployed during the process of authenticating a user to safeguard him/her from the vulnerable attacks. The proposed solution implements a novel authentication mechanism to counter various forms of security breach attacks including phishing, Trojan horse, replay, key logging, Asterisk logging, shoulder surfing, brute force search and others. QR code (Quick Response Code) is a type of matrix barcode or two-dimensional barcode that can be used for storing URLs, text, images and other information. In the proposed solution, during each new authentication request, a QR code is dynamically generated and presented to the user. A piece of generic information is mapped to plurality of elements and stored within the QR code. The mapping of generic information with plurality of elements, randomizes in each new login, and thus the QR code generated for each new authentication request is for one-time use only. In order to authenticate into the system, the user needs to decode the QR code using any QR code decoding software. The QR code decoding software needs to be installed on handheld mobile devices such as smartphones, personal digital assistant (PDA), etc. On decoding the QR code, the user will be presented a mapping between the generic piece of information and plurality of elements using which the user needs to derive cipher secret information corresponding to his/her actual password. Now, in place of the actual password, the user will use this cipher secret information to authenticate into the system. The authentication terminal will receive the cipher secret information and use a validation engine that will decipher the cipher secret information. If the entered secret information is correct, the user will be provided access to the system. Usability study has been carried out on the proposed solution, and the new authentication mechanism was found to be easy to learn and adapt. Mathematical analysis of the time taken to carry out brute force attack on the proposed solution has been carried out. The result of mathematical analysis showed that the solution is almost completely resistant to brute force attack. Today’s standard methods for authentication are subject to a wide variety of software, hardware, and human attacks. The proposed scheme can be very useful in controlling the various types of authentication related attacks especially in a networked computer environment where the use of username and password for authentication is common.

Keywords: authentication, QR code, cipher / decipher text, one time password, secret information

Procedia PDF Downloads 253
17677 Dating Violence and Cultural Acceptance among Mexican High School Students

Authors: Libia Yanelli Yanez-Penunuri, Carlos Alejandro Hidalgo-Rasmussen, Cesar Armando Rey-Anacona

Abstract:

Cultural and social norms have a great influence on individual behavior, including the use of violence. In this way, culture can protect against violence, but it can also support and encourage the use of violence. The aim of this study was to analyze differences in cultural acceptance and dating violence among Mexican high school students. A Cross-sectional study was carried out with 867 adolescent Mexican students of high school aged 14 to 18 years old in a dating relationship for at least a month in Guzman City, Mexico. To measure cultural acceptance and dating violence, the questionnaire abuse in dating (CMO) was applied. Informed consent to parents and students was requested. Analyses of descriptive and inferential statistics were performed. Participants were adolescent girls (61.4%) and adolescent boys (38.6%). About 63.7% of adolescents reported cultural acceptance of dating violence in their dating relationships. Associations between physical, sexual, economical dating violence and cultural acceptance were found. No association was found between psychological dating violence and cultural acceptance. The effect size in all dimensions was small. For future research, it is very important to take into consideration the change and evaluation of culture norms to prevent dating violence among adolescents.

Keywords: adolescents, culture, social norms, dating violence, students

Procedia PDF Downloads 179
17676 Using Artificial Intelligence Technology to Build the User-Oriented Platform for Integrated Archival Service

Authors: Lai Wenfang

Abstract:

Tthis study will describe how to use artificial intelligence (AI) technology to build the user-oriented platform for integrated archival service. The platform will be launched in 2020 by the National Archives Administration (NAA) in Taiwan. With the progression of information communication technology (ICT) the NAA has built many systems to provide archival service. In order to cope with new challenges, such as new ICT, artificial intelligence or blockchain etc. the NAA will try to use the natural language processing (NLP) and machine learning (ML) skill to build a training model and propose suggestions based on the data sent to the platform. NAA expects the platform not only can automatically inform the sending agencies’ staffs which records catalogues are against the transfer or destroy rules, but also can use the model to find the details hidden in the catalogues and suggest NAA’s staff whether the records should be or not to be, to shorten the auditing time. The platform keeps all the users’ browse trails; so that the platform can predict what kinds of archives user could be interested and recommend the search terms by visualization, moreover, inform them the new coming archives. In addition, according to the Archives Act, the NAA’s staff must spend a lot of time to mark or remove the personal data, classified data, etc. before archives provided. To upgrade the archives access service process, the platform will use some text recognition pattern to black out automatically, the staff only need to adjust the error and upload the correct one, when the platform has learned the accuracy will be getting higher. In short, the purpose of the platform is to deduct the government digital transformation and implement the vision of a service-oriented smart government.

Keywords: artificial intelligence, natural language processing, machine learning, visualization

Procedia PDF Downloads 152
17675 Emotional Analysis for Text Search Queries on Internet

Authors: Gemma García López

Abstract:

The goal of this study is to analyze if search queries carried out in search engines such as Google, can offer emotional information about the user that performs them. Knowing the emotional state in which the Internet user is located can be a key to achieve the maximum personalization of content and the detection of worrying behaviors. For this, two studies were carried out using tools with advanced natural language processing techniques. The first study determines if a query can be classified as positive, negative or neutral, while the second study extracts emotional content from words and applies the categorical and dimensional models for the representation of emotions. In addition, we use search queries in Spanish and English to establish similarities and differences between two languages. The results revealed that text search queries performed by users on the Internet can be classified emotionally. This allows us to better understand the emotional state of the user at the time of the search, which could involve adapting the technology and personalizing the responses to different emotional states.

Keywords: emotion classification, text search queries, emotional analysis, sentiment analysis in text, natural language processing

Procedia PDF Downloads 128
17674 A Survey of Recognizing of Daily Living Activities in Multi-User Smart Home Environments

Authors: Kulsoom S. Bughio, Naeem K. Janjua, Gordana Dermody, Leslie F. Sikos, Shamsul Islam

Abstract:

The advancement in information and communication technologies (ICT) and wireless sensor networks have played a pivotal role in the design and development of real-time healthcare solutions, mainly targeting the elderly living in health-assistive smart homes. Such smart homes are equipped with sensor technologies to detect and record activities of daily living (ADL). This survey reviews and evaluates existing approaches and techniques based on real-time sensor-based modeling and reasoning in single-user and multi-user environments. It classifies the approaches into three main categories: learning-based, knowledge-based, and hybrid, and evaluates how they handle temporal relations, granularity, and uncertainty. The survey also highlights open challenges across various disciplines (including computer and information sciences and health sciences) to encourage interdisciplinary research for the detection and recognition of ADLs and discusses future directions.

Keywords: daily living activities, smart homes, single-user environment, multi-user environment

Procedia PDF Downloads 122
17673 Study on Errors in Estimating the 3D Gaze Point for Different Pupil Sizes Using Eye Vergences

Authors: M. Pomianek, M. Piszczek, M. Maciejewski

Abstract:

The binocular eye tracking technology is increasingly being used in industry, entertainment and marketing analysis. In the case of virtual reality, eye tracking systems are already the basis for user interaction with the environment. In such systems, the high accuracy of determining the user's eye fixation point is very important due to the specificity of the virtual reality head-mounted display (HMD). Often, however, there are unknown errors occurring in the used eye tracking technology, as well as those resulting from the positioning of the devices in relation to the user's eyes. However, can the virtual environment itself influence estimation errors? The paper presents mathematical analyses and empirical studies of the determination of the fixation point and errors resulting from the change in the size of the pupil in response to the intensity of the displayed scene. The article contains both static laboratory tests as well as on the real user. Based on the research results, optimization solutions were proposed that would reduce the errors of gaze estimation errors. Studies show that errors in estimating the fixation point of vision can be minimized both by improving the pupil positioning algorithm in the video image and by using more precise methods to calibrate the eye tracking system in three-dimensional space.

Keywords: eye tracking, fixation point, pupil size, virtual reality

Procedia PDF Downloads 118
17672 Exploring the Effect of Nursing Students’ Self-Directed Learning and Technology Acceptance through the Use of Digital Game-Based Learning in Medical Terminology Course

Authors: Hsin-Yu Lee, Ming-Zhong Li, Wen-Hsi Chiu, Su-Fen Cheng, Shwu-Wen Lin

Abstract:

Background: The use of medical terminology is essential to professional nurses on clinical practice. However, most nursing students consider traditional lecture-based teaching of medical terminology as boring and overly conceptual and lack motivation to learn. It is thus an issue to be discussed on how to enhance nursing students’ self-directed learning and improve learning outcomes of medical terminology. Digital game-based learning is a learner-centered way of learning. Past literature showed that the most common game-based learning for language education has been immersive games and teaching games. Thus, this study selected role-playing games (RPG) and digital puzzle games for observation and comparison. It is interesting to explore whether digital game-based learning has positive impact on nursing students’ learning of medical terminology and whether students can adapt well on this type of learning. Results can be used to provide references for institutes and teachers on teaching medical terminology. These instructions give you guidelines for preparing papers for the conference. Use this document as a template if you are using Microsoft Word. Otherwise, use this document as an instruction set. The electronic file of your paper will be formatted further at WASET. Define all symbols used in the abstract. Do not cite references in the abstract. Do not delete the blank line immediately above the abstract; it sets the footnote at the bottom of this column. Page margins are 1,78 cm top and down; 1,65 cm left and right. Each column width is 8,89 cm and the separation between the columns is 0,51 cm. Objective: The purpose of this research is to explore respectively the impact of RPG and puzzle game on nursing students’ self-directed learning and technology acceptance. The study further discusses whether different game types bring about different influences on students’ self-directed learning and technology acceptance. Methods: A quasi-experimental design was adopted in this study so that repeated measures between two groups could be conveniently conducted. 103 nursing students from a nursing college in Northern Taiwan participated in the study. For three weeks of experiment, the experiment group (n=52) received “traditional teaching + RPG” while the control group (n=51) received “traditional teaching + puzzle games”. Results: 1. On self-directed learning: For each game type, there were significant differences for the delayed tests of both groups as compared to the pre and post-tests of each group. However, there were no significant differences between the two game types. 2. On technology acceptance: For the experiment group, after the intervention of RPG, there were no significant differences concerning technology acceptance. For the control group, after the intervention of puzzle games, there were significant differences regarding technology acceptance. Pearson-correlation coefficient and path analysis conducted on the results of the two groups revealed that the dimension were highly correlated and reached statistical significance. Yet, the comparison of technology acceptance between the two game types did not reach statistical significance. Conclusion and Recommend: This study found that through using different digital games on learning, nursing students have effectively improved their self-directed learning. Students’ technology acceptances were also high for the two different digital game types and each dimension was significantly correlated. The results of the experimental group showed that through the scenarios of RPG, students had a deeper understanding of medical terminology, which reached the ‘Understand’ dimension of Bloom’s taxonomy. The results of the control group indicated that digital puzzle games could help students memorize and review medical terminology, which reached the ‘Remember’ dimension of Bloom’s taxonomy. The findings suggest that teachers of medical terminology could use digital games to assist their teaching according to their goals on cognitive learning. Adequate use of those games could help improve students’ self-directed learning and further enhance their learning outcome on medical terminology.

Keywords: digital game-based learning, medical terminology, nursing education, self-directed learning, technology acceptance model

Procedia PDF Downloads 147
17671 The Effect of Satisfaction with the Internet on Online Shopping Attitude With TAM Approach Controlled By Gender

Authors: Velly Anatasia

Abstract:

In the last few decades extensive research has been conducted into information technology (IT) adoption, testing a series of factors considered to be essential for improved diffusion. Some studies analyze IT characteristics such as usefulness, ease of use and/or security, others focus on the emotions and experiences of users and a third group attempts to determine the importance of socioeconomic user characteristics such as gender, educational level and income. The situation is similar regarding e-commerce, where the majority of studies have taken for granted the importance of including these variables when studying e-commerce adoption, as these were believed to explain or forecast who buys or who will buy on the internet. Nowadays, the internet has become a marketplace suitable for all ages and incomes and both genders and thus the prejudices linked to the advisability of selling certain products should be revised. The objective of this study is to test whether the socioeconomic characteristics of experienced e-shoppers such as gender rally moderate the effect of their perceptions of online shopping behavior. Current development of the online environment and the experience acquired by individuals from previous e-purchases can attenuate or even nullify the effect of these characteristics. The individuals analyzed are experienced e-shoppers i.e. individuals who often make purchases on the internet. The Technology Acceptance Model (TAM) was broadened to include previous use of the internet and perceived self-efficacy. The perceptions and behavior of e-shoppers are based on their own experiences. The information obtained will be tested using questionnaires which were distributed and self-administered to respondent accustomed using internet. The causal model is estimated using structural equation modeling techniques (SEM), followed by tests of the moderating effect of socioeconomic variables on perceptions and online shopping behavior. The expected findings of this study indicated that gender moderate neither the influence of previous use of the internet nor the perceptions of e-commerce. In short, they do not condition the behavior of the experienced e-shopper.

Keywords: Internet shopping, age groups, gender, income, electronic commerce

Procedia PDF Downloads 319
17670 Integrated Model for Enhancing Data Security Processing Time in Cloud Computing

Authors: Amani A. Saad, Ahmed A. El-Farag, El-Sayed A. Helali

Abstract:

Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a simple user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form.

Keywords: cloud computing, data security, SAAS, PAAS, IAAS, Blowfish

Procedia PDF Downloads 337
17669 Proposal of a Damage Inspection Tool After Earthquakes: Case of Algerian Buildings

Authors: Akkouche Karim, Nekmouche Aghiles, Bouzid Leyla

Abstract:

This study focuses on the development of a multifunctional Expert System (ES) called post-seismic damage inspection tool (PSDIT), a powerful tool which allows the evaluation, the processing and the archiving of the collected data stock after earthquakes. PSDIT can be operated by two user types; an ordinary user (engineer, expert or architect) for the damage visual inspection and an administrative user for updating the knowledge and / or for adding or removing the ordinary user. The knowledge acquisition is driven by a hierarchical knowledge model, the Information from investigation reports and those acquired through feedback from expert / engineer questionnaires are part.

Keywords: buildings, earthquake, seismic damage, damage assessment, expert system

Procedia PDF Downloads 67
17668 Indirect Environmental Benefits from Cloud Computing Information and Communications Technology Integration in Rural Agricultural Communities

Authors: Jeana Cadby, Kae Miyazawa

Abstract:

With rapidly expanding worldwide adoption of mobile technologies, Information and Communication Technology (ITC) is a major energy user and a contributor to global carbon emissions, due to infrastructure and operational energy consumption. The agricultural sector is also significantly responsible for contributing to global carbon emissions. However, ICT cloud computing using mobile technology can directly reduce environmental impacts in the agricultural sector through applications and mobile connectivity, such as precision fertilizer and pesticide applications, or access to weather data, for example. While direct impacts are easily calculated, indirect environmental impacts from ICT cloud computing usage have not been thoroughly investigated. For example, while women may be more poorly equipped for adaptation to environmentally sustainable agricultural practices due to resource constraints, this research concludes that indirect environmental benefits can be achieved by improving rural access to mobile technology for women. Women in advanced roles and secure land tenure are more likely to invest in long-term agricultural conservation strategies, which protect against environmental degradation. This study examines how ICT using mobile technology advances the role of women in rural agricultural systems and indirectly reduces environmental impacts from agricultural production, through literature examination from secondary sources. Increasing access for women to ICT mobile technology provides indirect environmental and social benefits in the rural agricultural sector.

Keywords: cloud computing, environmental benefits, mobile technology, women

Procedia PDF Downloads 147
17667 The Impact of ChatGPT on the Healthcare Domain: Perspectives from Healthcare Majors

Authors: Su Yen Chen

Abstract:

Extensive research on ChatGPT has revealed its capabilities and limitations across various clinical, educational, and research contexts, emphasizing crucial issues such as accuracy, transparency, and ethical usage. Studies applying the Technology Acceptance Model (TAM) and Uses and Gratifications Theory have deepened our understanding of the factors that drive user acceptance and satisfaction of ChatGPT for general use. These insights are particularly valuable for examining healthcare-specific behaviors, trust levels, and perceived risks. Despite these advancements, there remains a notable gap in our understanding of how general user perceptions of AI translate into its practical applications within the healthcare sector. This study focuses on examining the perceptions of ChatGPT's impact among 266 healthcare majors in Taiwan, exploring its implications for their career development and utility in clinical practice, medical education, and research. By employing a structured survey with precisely defined subscales, this research aims to probe the breadth of ChatGPT's applications within healthcare, assessing both the perceived benefits and the challenges it presents. The findings from the survey reveal that perceptions and usage of ChatGPT among healthcare majors vary significantly, influenced by factors such as its perceived utility, risk, novelty, and trustworthiness. Graduate students and those who perceive ChatGPT as more beneficial and less risky are particularly inclined to use it more frequently. This increased usage is closely linked to significant impacts on personal career development. Furthermore, ChatGPT's perceived usefulness contributes to its broader impact within the healthcare domain, suggesting that both innovation and practical utility are key drivers of acceptance and perceived effectiveness in professional healthcare settings. Trust emerges as an important factor, especially in clinical settings where the stakes are high. The trust that healthcare professionals place in ChatGPT significantly affects its integration into clinical practice and influences outcomes in medical education and research. Thus, ChatGPT's reliability and practical value are critical for its successful adoption in these areas. However, an interesting paradox arises with regard to ease of use. While making ChatGPT more user-friendly is generally seen as beneficial, it also raises concerns among users who have lower levels of trust and perceive higher risks associated with its use. This complex interplay between ease of use and safety concerns necessitates a careful balance, highlighting the need for robust security measures and clear, transparent communication about how AI systems work and their limitations. The study suggests several strategic approaches to enhance the adoption and integration of AI in healthcare. These include targeted training programs for healthcare professionals to increase familiarity with AI technologies, reduce perceived risks, and build trust. Ensuring transparency and conducting rigorous testing are also vital to foster trust and reliability. Moreover, comprehensive policy frameworks are needed to guide the implementation of AI technologies, ensuring high standards of patient safety, privacy, and ethical use. These measures are crucial for fostering broader acceptance of AI in healthcare, as the study contributes to enriching the discourse on AI's role by detailing how various factors affect its adoption and impact.

Keywords: ChatGPT, healthcare, survey study, IT adoption, behaviour, applcation, concerns

Procedia PDF Downloads 10
17666 The Anti-Cyber and Information Technology Crimes Law on Information Access and Dissemination by Egyptian Journalists

Authors: Miral Sabry AlAshry

Abstract:

The main objective of the study is to investigate the effectiveness of Egyptian Journalists through the Anti-Cyber and Information Technology Crimes Law, as well as its implications for journalistic practice and the implications for press freedom in Egypt. Questionnaires were undertaken with 192 journalists representing four official newspapers, and in-depth interviews were held with 15 journalists. The study used an Authoritarian theory as a theoretical framework. The study revealed that the government placed restrictions on journalists by using the law to oppress them.

Keywords: anti-cyber and information technology crimes law, media legislation, personal information, Egyptian constitution

Procedia PDF Downloads 355
17665 Efficient Position Based Operation Code Authentication

Authors: Hashim Ali, Sheheryar Khan

Abstract:

Security for applications is always been a keen issue of concern. In general, security is to allow access of grant to legal user or to deny non-authorized access to the system. Shoulder surfing is an observation technique to hack an account or to enter into a system. When a malicious observer is capturing or recording the fingers of a user while he is entering sensitive inputs (PIN, Passwords etc.) and may be able to observe user’s password credential. It is very rigorous for a novice user to prevent himself from shoulder surfing or unaided observer in a public place while accessing his account. In order to secure the user account, there are five factors of authentication; they are: “(i) something you have, (ii) something you are, (iii) something you know, (iv) somebody you know, (v) something you process”. A technique has been developed of fifth-factor authentication “something you process” to provide novel approach to the user. In this paper, we have applied position based operational code authentication in such a way to more easy and user friendly to the user.

Keywords: shoulder surfing, malicious observer, sensitive inputs, authentication

Procedia PDF Downloads 253
17664 The Need for a Tool to Support Users of E-Science Infrastructures in a Virtual Laboratory Environment

Authors: Hashim Chunpir

Abstract:

Support processes play an important role to facilitate researchers (users) to accomplish their research activities with the help of cyber-infrastructure(s). However, the current user-support process in cyber-infrastructure needs a feasible tool to support users. This tool must enable the users of a cyber-infrastructure to communicate efficiently with the staffs of a cyber-infrastructure in order to get technical and scientific assistance, whilst saving resources at the same time. This research paper narrates the real story of employing various forms of tools to support the user and staff communication. In addition, this paper projects the lessons learned from an exploration of the help-desk tools in the current state of user support process in Earth System Grid Federation (ESGF) from support staffs’ perspective. ESGF is a climate cyber-infrastructure that facilitates Earth System Modeling (ESM) and is taken as a case study in this paper. Finally, this study proposes a need for a tool, a framework or a platform that not only improves the user support process to address support servicing needs of end-users of e-Science infrastructures but also eases the life of staffs in providing assistance to the users. With the help of such a tool; the collaboration between users and the staffs of cyber-infrastructures is made easier. Consequently, the research activities of the users of e-Science infrastructure will thrive as the scientific and technical support will be available to users. Finally, this results into painless and productive e-Research.

Keywords: e-Science User Services, e-Research in Earth Sciences, Information Technology Services Management (ITSM), user support process, service desk, management of support activities, help desk tools, application of social media

Procedia PDF Downloads 461
17663 Couple Relationship Satisfaction: The Role of Recollection of Parental Acceptance, Self-Differentiation and Spousal Caregiving

Authors: Ricky Finzi-Dottan

Abstract:

The actor–partner interdependence model (APIM) was employed in this study to investigate the mediating effect self-differentiation and spousal caregiving have on the relationship between recollection of parental care and acceptance and couple satisfaction. One hundred and forty-four non-clinical couples (N=288) in enduring relationships were recruited. Results for actor effects revealed two mediating paths whereby, among both partners, recollection of maternal (but not paternal) acceptance was associated with their self-differentiation and responsive spousal caregiving, which, in turn, were linked to their spousal relationship satisfaction. Partner effects revealed three mediating paths: for both partners, recollection of childhood maternal acceptance was associated with responsive caregiving, which, in turn, was linked with their partner’s relationship satisfaction. Interestingly, the husbands’ recollection of maternal acceptance was associated with their partners' responsive spousal caregiving, which was linked to both spouses’ relationship satisfaction. Our results may support the theoretical assumptions regarding intergenerational continuity from perceptions of childhood via self-differentiation effecting couple caregiving to couple relationship, but only on the mother's part.

Keywords: couple relationship satisfaction, childhood parental acceptance, self-differentiation, couple caregiving, dyadic perspective

Procedia PDF Downloads 147
17662 Exploitation of Technology by the Tshwane Residence for Tourism Development Purposes

Authors: P. P. S. Sifolo, P. Tladi, J. Maimela

Abstract:

This article investigates technology used by Tshwane residents intended for tourism purposes. The aim is to contribute information to the Tshwane interested parties for planning and management concerning technology within the tourism sector. This study identified the types of tourist related technologies used by the Tshwane residents, be it for business purposes or personal use. The study connected the exploitation of technology for tourism purposes through unpacking the tourism sector as it utilizes technology. Quantitative research methodology was used whereby self-completed questionnaires were chosen as research instruments. The research study carried out a search for knowledge on technology for tourism and the Tshwane residents; however the study revealed that technology has certainly imprinted tourism massively because of its effectiveness and efficiency. Technology has assisted tourism businesses stay abreast of competition with ICT and because of that, SA is on the map as one the economically performing countries in Africa. Moreover, technology and tourism make a meaningful impact on job creation and Gross Domestic Product (GDP).

Keywords: tourism, information and communication technology, Tshwane residents, technology for tourism

Procedia PDF Downloads 372
17661 Forecasting Future Society to Explore Promising Security Technologies

Authors: Jeonghwan Jeon, Mintak Han, Youngjun Kim

Abstract:

Due to the rapid development of information and communication technology (ICT), a substantial transformation is currently happening in the society. As the range of intelligent technologies and services is continuously expanding, ‘things’ are becoming capable of communicating one another and even with people. However, such “Internet of Things” has the technical weakness so that a great amount of such information transferred in real-time may be widely exposed to the threat of security. User’s personal data are a typical example which is faced with a serious security threat. The threats of security will be diversified and arose more frequently because next generation of unfamiliar technology develops. Moreover, as the society is becoming increasingly complex, security vulnerability will be increased as well. In the existing literature, a considerable number of private and public reports that forecast future society have been published as a precedent step of the selection of future technology and the establishment of strategies for competitiveness. Although there are previous studies that forecast security technology, they have focused only on technical issues and overlooked the interrelationships between security technology and social factors are. Therefore, investigations of security threats in the future and security technology that is able to protect people from various threats are required. In response, this study aims to derive potential security threats associated with the development of technology and to explore the security technology that can protect against them. To do this, first of all, private and public reports that forecast future and online documents from technology-related communities are collected. By analyzing the data, future issues are extracted and categorized in terms of STEEP (Society, Technology, Economy, Environment, and Politics), as well as security. Second, the components of potential security threats are developed based on classified future issues. Then, points that the security threats may occur –for example, mobile payment system based on a finger scan technology– are identified. Lastly, alternatives that prevent potential security threats are proposed by matching security threats with points and investigating related security technologies from patent data. Proposed approach can identify the ICT-related latent security menaces and provide the guidelines in the ‘problem – alternative’ form by linking the threat point with security technologies.

Keywords: future society, information and communication technology, security technology, technology forecasting

Procedia PDF Downloads 451
17660 An Era of Arts: Examining Intersection of Technology and Museums

Authors: Vivian Li

Abstract:

With the rapid development of technology, virtual reality (VR) and augmented reality (AR) are becoming increasingly prominent in our lives. Museums have led the way in digitization, offering their collections to the wider public through the open internet, which is dramatically changing our experience of art. Technology is also being implemented into our physical art-viewing experience, enabling museums to capture historical sites while creating a more immersive experience for patrons. This study takes a qualitative approach, examining secondary sources and synthesizing information from interviews with field professionals to answer the question: to what extent is the contemporary perception of art transformed by the digitization of art museums? The findings establish that museums are becoming increasingly open with their collections, utilizing digitization to spread their intellectual content to people worldwide and to diversify their audiences. The use of VR and AR is also enabling museums to preserve and showcase historical artifacts and sites in a more interactive and user-focused way. Technology is also crafting new forms of art and art museums. Ultimately, the intersection of technology and museums is not changing the definition of art but rather offering new modes for the public to experience and learn about arts and history.

Keywords: art, augmented reality, digitization, museums, technology, virtual reality

Procedia PDF Downloads 104
17659 The Factors Influencing Consumer Intentions to Use Internet Banking and Apps: A Case of Banks in Cambodia

Authors: Tithdanin Chav, Phichhang Ou

Abstract:

The study is about the e-banking consumer behavior of five major banks in Cambodia. This work aims to examine the relationships among job relevance, trust, mobility, perceived ease of use, perceived usefulness, attitude toward using, and intention to use of internet banking and apps. Also, the research develops and tests a conceptual model of intention to use internet banking by integrating the Technology Acceptance Model (TAM) and job relevance, trust, and mobility which were supported by Theory of Reasoned Action (TRA) and Theory of Planned Behavior (TPB). The proposed model was tested using Structural Equation Modeling (SEM), which was processed by using SPSS and AMOS with a sample size of 250 e-banking users. The results showed that there is a significant positive relationship among variables and attitudes toward using internet banking, and apps are the most factor influencing consumers’ intention to use internet banking and apps with the importance level in SEM 0.82 accounted by 82%. Significantly, all six hypotheses were accepted.

Keywords: bank apps, consumer intention, internet banking, technology acceptance model, TAM

Procedia PDF Downloads 124
17658 The Relationship Between Cyberbullying Victimization, Parent and Peer Attachment and Unconditional Self-Acceptance

Authors: Florina Magdalena Anichitoae, Anca Dobrean, Ionut Stelian Florean

Abstract:

Due to the fact that cyberbullying victimization is an increasing problem nowadays, affecting more and more children and adolescents around the world, we wanted to take a step forward analyzing this phenomenon. So, we took a look at some variables which haven't been studied together before, trying to develop another way to view cyberbullying victimization. We wanted to test the effects of the mother, father, and peer attachment on adolescent involvement in cyberbullying as victims through unconditional self acceptance. Furthermore, we analyzed each subscale of the IPPA-R, the instrument we have used for parents and peer attachment measurement, in regards to cyberbullying victimization through unconditional self acceptance. We have also analyzed if gender and age could be taken into consideration as moderators in this model. The analysis has been performed on 653 adolescents aged 11-17 years old from Romania. We used structural equation modeling, working in R program. For the fidelity analysis of the IPPA-R subscales, USAQ, and Cyberbullying Test, we have calculated the internal consistency index, which varies between .68-.91. We have created 2 models: the first model including peer alienation, peer trust, peer communication, self acceptance and cyberbullying victimization, having CFI=0.97, RMSEA=0.02, 90%CI [0.02, 0.03] and SRMR=0.07, and the second model including parental alienation, parental trust, parental communication, self acceptance and cyberbullying victimization and had CFI=0.97, RMSEA=0.02, 90%CI [0.02, 0.03] and SRMR=0.07. Our results were interesting: on one hand, cyberbullying victimization is predicted by peer alienation and peer communication through unconditional self acceptance. Peer trust directly, significantly, and negatively predicted the implication in cyberbullying. In this regard, considering gender and age as moderators, we found that the relationship between unconditional self acceptance and cyberbullying victimization is stronger in girls, but age does not moderate the relationship between unconditional self acceptance and cyberbullying victimization. On the other hand, regarding the degree of cyberbullying victimization as being predicted through unconditional self acceptance by parental alienation, parental communication, and parental trust, this hypothesis was not supported. Still, we could identify a direct path to positively predict victimization through parental alienation and negatively through parental trust. There are also some limitations to this study, which we've discussed in the end.

Keywords: adolescent, attachment, cyberbullying victimization, parents, peers, unconditional self-acceptance

Procedia PDF Downloads 186