Search results for: Islamic social security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 12431

Search results for: Islamic social security

10631 Typology of Fake News Dissemination Strategies in Social Networks in Social Events

Authors: Mohadese Oghbaee, Borna Firouzi

Abstract:

The emergence of the Internet and more specifically the formation of social media has provided the ground for paying attention to new types of content dissemination. In recent years, Social media users share information, communicate with others, and exchange opinions on social events in this space. Many of the information published in this space are suspicious and produced with the intention of deceiving others. These contents are often called "fake news". Fake news, by disrupting the circulation of the concept and similar concepts such as fake news with correct information and misleading public opinion, has the ability to endanger the security of countries and deprive the audience of the basic right of free access to real information; Competing governments, opposition elements, profit-seeking individuals and even competing organizations, knowing about this capacity, act to distort and overturn the facts in the virtual space of the target countries and communities on a large scale and influence public opinion towards their goals. This process of extensive de-truthing of the information space of the societies has created a wave of harm and worries all over the world. The formation of these concerns has led to the opening of a new path of research for the timely containment and reduction of the destructive effects of fake news on public opinion. In addition, the expansion of this phenomenon has the potential to create serious and important problems for societies, and its impact on events such as the 2016 American elections, Brexit, 2017 French elections, 2019 Indian elections, etc., has caused concerns and led to the adoption of approaches It has been dealt with. In recent years, a simple look at the growth trend of research in "Scopus" shows an increasing increase in research with the keyword "false information", which reached its peak in 2020, namely 524 cases, reached, while in 2015, only 30 scientific-research contents were published in this field. Considering that one of the capabilities of social media is to create a context for the dissemination of news and information, both true and false, in this article, the classification of strategies for spreading fake news in social networks was investigated in social events. To achieve this goal, thematic analysis research method was chosen. In this way, an extensive library study was first conducted in global sources. Then, an in-depth interview was conducted with 18 well-known specialists and experts in the field of news and media in Iran. These experts were selected by purposeful sampling. Then by analyzing the data using the theme analysis method, strategies were obtained; The strategies achieved so far (research is in progress) include unrealistically strengthening/weakening the speed and content of the event, stimulating psycho-media movements, targeting emotional audiences such as women, teenagers and young people, strengthening public hatred, calling the reaction legitimate/illegitimate. events, incitement to physical conflict, simplification of violent protests and targeted publication of images and interviews were introduced.

Keywords: fake news, social network, social events, thematic analysis

Procedia PDF Downloads 68
10630 The Perceived Impact of Consultancy Organisations and Social Enterprises: Converging and Diverging Discourses

Authors: Seda Muftugil-Yalcin

Abstract:

With the proliferation of the number of social enterprises worldwide, there is now a whole ecosystem full of different organisational actors revolving around social enterprises. Impact hubs, incubation centers, and organisations (profit or non-profit) that offer consultancy services to social enterprises can be said to constitute one such cluster in the eco-system. These organisations offer a variety of services to social enterprises which desire to maximize their positive social impact. Especially with regards to impact measurement, there are numerous systems/guides/approaches/tools developed that claim to benefit social enterprises. Many organisations choose one of the existing tools and craft programs that help social enterprises to measure and to manage their social impacts. However, empirical evidence with regards to how the services of these consultancy organisations are precisely utilized on the field is scarce. This inevitably casts doubt on the impact of these organisations themselves. This research dwells on four case studies from the Netherlands and Turkey. In each country, two university-affiliated impact centers and two independent consultancy agencies that work with social entrepreneurs in the area of social impact measurement are closely examined. The overarching research question has been 'With regards to impact measurement, how do the founders/managers of these organisations perceive and make sense of their contribution to social enterprises and to the social entrepreneurship eco-system at large?' As for methodology, in-depth interviews were carried out with the managers/founders of these organisations and discourse analysis method has been used for data analysis together with grounded theory. The comparison between Turkey and Netherlands elucidate common denominators of impact measurement hype and discourses that are currently existing worldwide. In addition, it also reveals differing priorities of social enterprises in these different settings, which shape the expectations of social enterprises of consultancy organisations. Comparison between university affiliated impact hubs and independent consultancy organisations also give away important data about how different forms of consultancy organisations (in this case university based and independent) position themselves in relation to alike organisations with similar aims. The overall aim of the research is to reveal the contribution of the consultancy organisations that work with social enterprises to the social entrepreneurship field as perceived by them through a cross cultural study. The findings indicate that in both settings, the organisations that were claiming to bring positive social impact on the social entrepreneurship eco-system through their impact measurement trainings were themselves having a hard time in concretizing their own contributions; which indicated that these organisations were in need of a different impact measurement discourse than the ones they were championing.

Keywords: consultancy organisations, social entrepreneurship, social impact measurement, social impact discourse

Procedia PDF Downloads 127
10629 A Reasoning Method of Cyber-Attack Attribution Based on Threat Intelligence

Authors: Li Qiang, Yang Ze-Ming, Liu Bao-Xu, Jiang Zheng-Wei

Abstract:

With the increasing complexity of cyberspace security, the cyber-attack attribution has become an important challenge of the security protection systems. The difficult points of cyber-attack attribution were forced on the problems of huge data handling and key data missing. According to this situation, this paper presented a reasoning method of cyber-attack attribution based on threat intelligence. The method utilizes the intrusion kill chain model and Bayesian network to build attack chain and evidence chain of cyber-attack on threat intelligence platform through data calculation, analysis and reasoning. Then, we used a number of cyber-attack events which we have observed and analyzed to test the reasoning method and demo system, the result of testing indicates that the reasoning method can provide certain help in cyber-attack attribution.

Keywords: reasoning, Bayesian networks, cyber-attack attribution, Kill Chain, threat intelligence

Procedia PDF Downloads 456
10628 Tea Club (Singapore)-Learning to Navigate the Social World without Fear: Adapted from PEERS® for Young Adults

Authors: Janice Cheong, Tan Seying

Abstract:

The growing years in adolescence are often a tumultuous time for both the individual and family; this is especially so for individuals with Autism Spectrum Disorder (ASD) and Social Communication Disorder (SCD). Tea Club, which is adapted from the PEERS® for Young Adults, seeks to address some of the social challenges faced by Singaporean adolescents with ASD/SCD while navigating social situations. Tea club (hybrid) consists of face-to-face sessions and virtual sessions. These sessions work with both the adolescent and their parents to tackle the individual's difficulties with social skills, empathy, and loneliness. Prior to the group intervention, both participants and their parents scored on the Test of Adolescent Social Skills Knowledge (TASSK) and Autism Spectrum Quotient (AQ), respectively. The session was spread across four months. At the end of the group based intervention, participants’ and parents’ scores were collected again and compared. Inputs on the programme and participant’s confidence in socialization were also gathered from both participants and their parents and looked at thematically. The findings highlight some of the challenges faced by teens with ASD in Singapore and the benefits of the intervention. Parental sentiments are also examined and discussed.

Keywords: adolescence autism, group intervention, social communication disorder, social skills

Procedia PDF Downloads 152
10627 Effects of Social Support and Self-Regulation on Changes in Exercise Behavior Among Infertile Women: A Cross-Sectional Study to Comparison of External and Internal Factors

Authors: Arezoo Fallahi‎

Abstract:

Background: Exercise behavior (EB) has a significant impact on infertility, but the magnitude of the effect is not easily determined. The aim of the present study was to assess the effect of social support and self-regulation, as external and internal factors, on changes in exercise behavior among infertile women. Methods: For a cross-sectional study conducted in Sanandaj (Iran) in 2020, we recruited infertile women (n=483) from 35 comprehensive healthcare centers by means of convenience sampling. Standardized face-to-face interviews were conducted using established and reliable instruments for the assessment of EB, social support, and self-regulation. Logistic regression models were applied to assess the association between EB, social support and self-regulation. Results: The majority of the participants (56.7%) had secondary infertility, while 70.8% of them did not perform any exercise. Self-regulation and social support were significantly higher in women with secondary infertility than in those with primary infertility (p < 0.01). Self-regulation was significantly lower in women whose height was below 160 centimeters (cm) (p<0.05). Social support was significantly higher among participants aged ≥ 35 years and weighing ≥ 60 kilograms (kg) (p < 0.01). The odds of EB adoption increased with self-regulation and social support (OR=1.05, 95% CI=1.02-1.09, p <0.01), (OR=1.06, 95% CI=1.02-1.11, p <0.01). Conclusion: Social support and self-regulation almost equally influenced EB in infertile women. Designing support and consultation programs can be considered in encouraging infertile women to do exercise in future research.

Keywords: social support, regulation, infertility, women, exercise

Procedia PDF Downloads 99
10626 Personality Traits of NEO Five Factors and Statistics Anxiety among Social Sciences University Students

Authors: Oluyinka Ojedokun, S. E. Idemudia

Abstract:

In Nigeria, statistics is a compulsory course required from all social sciences students as part of their academic training. However, a rising number of social sciences undergraduates usually express statistics anxiety. The prevalence of statistics anxiety among undergraduates in social sciences has created a growing concern for educators and researchers in the higher education institutions, mainly because this statistics anxiety adversely affects their performance in statistics and research methods courses. From a societal perspective it is important to reverse this trend. Although scholars and researchers have highlighted some psychosocial factors that influence statistics anxiety in students but few empirical studies exist on the association between personality traits of NEO five factors and statistics anxiety. It is in the light of this situation that this study was designed to assess the extent to which the personality traits of NEO five factors influence statistics anxiety of students in social sciences courses. The participants were 282 undergraduates in the faculty of social sciences at a state owned public university in Nigeria. The findings demonstrate that the personality traits contributing to statistics anxiety include openness to experience, conscientious, extraversion, and neuroticism. These results imply that statistics anxiety is related to individual differences in personality traits and suggest that certain aspects of statistics anxiety may be relatively stable and resistant to change. An effective and simple method to reduce statistics anxiety among social sciences students is to create awareness of the statistical and methodological requirements of the social sciences courses before commencement of their programmes.

Keywords: personality traits, statistics anxiety, social sciences, students

Procedia PDF Downloads 541
10625 Management and Agreement Protocol in Computer Security

Authors: Abdulameer K. Hussain

Abstract:

When dealing with a cryptographic system we note that there are many activities performed by parties of this cryptographic system and the most prominent of these activities is the process of agreement between the parties involved in the cryptographic system on how to deal and perform the cryptographic system tasks to be more secure, more confident and reliable. The most common agreement among parties is a key agreement and other types of agreements. Despite the fact that there is an attempt from some quarters to find other effective agreement methods but these methods are limited to the traditional agreements. This paper presents different parameters to perform more effectively the task of the agreement, including the key alternative, the agreement on the encryption method used and the agreement to prevent the denial of the services. To manage and achieve these goals, this method proposes the existence of an control and monitoring entity to manage these agreements by collecting different statistical information of the opinions of the authorized parties in the cryptographic system. These statistics help this entity to take the proper decision about the agreement factors. This entity is called Agreement Manager (AM).

Keywords: agreement parameters, key agreement, key exchange, security management

Procedia PDF Downloads 425
10624 Psychological Capital as Pathways to Social Well-Being Among International Faculty in UAE: A Mediated-Moderated Study

Authors: Ejoke U. P., Smitha Dev., Madwuke Ann, DuPlessis E. D.

Abstract:

The study examines the relationship between psychological capital (PsyCap) and social well-being among international faculty members in the United Arab Emirates (UAE). The UAE has become a significant destination for global academic talent, yet challenges related to social integration, acceptance, and overall well-being persist among its international faculty. The study focuses on the predictive role of PsyCap, encompassing hope, efficacy, resilience, and optimism, in determining various dimensions of social well-being, including social integration, acceptance, contribution, actualization, and coherence. Additionally, the research investigates the potential moderating or mediating effects of institutional support and Faculty Job-Status position on the relationship between PsyCap and social well-being. Through structural equation modeling, we found that institutional support mediated the positive relationship between PsyCap and SWB and the permanent Faculty job-status position type strengthens the relationship between PsyCap and SWB. Our findings uncover the pathways through which PsyCap influences the social well-being outcomes of international faculty in the UAE. The findings will contribute to the development of tailored interventions and support systems aimed at enhancing the integration experiences and overall well-being of international faculty within the UAE academic community. Thus, fostering a more inclusive and thriving academic environment in the UAE.

Keywords: faculty job-status, institutional-faculty, psychological capital, social well-being, UAE

Procedia PDF Downloads 57
10623 Social Network Analysis as a Research and Pedagogy Tool in Problem-Focused Undergraduate Social Innovation Courses

Authors: Sean McCarthy, Patrice M. Ludwig, Will Watson

Abstract:

This exploratory case study explores the deployment of Social Network Analysis (SNA) in mapping community assets in an interdisciplinary, undergraduate, team-taught course focused on income insecure populations in a rural area in the US. Specifically, it analyzes how students were taught to collect data on community assets and to visualize the connections between those assets using Kumu, an SNA data visualization tool. Further, the case study shows how social network data was also collected about student teams via their written communications in Slack, an enterprise messaging tool, which enabled instructors to manage and guide student research activity throughout the semester. The discussion presents how SNA methods can simultaneously inform both community-based research and social innovation pedagogy through the use of data visualization and collaboration-focused communication technologies.

Keywords: social innovation, social network analysis, pedagogy, problem-based learning, data visualization, information communication technologies

Procedia PDF Downloads 151
10622 The Effectiveness of Goldstein's Social Skillstreaming Model on Social Skills of Special Education Pre-Service Teachers

Authors: Ragea Alqahtani

Abstract:

The purpose of the study was to measure the effectiveness of the Goldstein’s social skill streaming model based on the special and general pre-service teachers’ knowledge about controlling their emotions in conflict situations. A review of previous pieces of literature guided the design and measurement of the effectiveness of the approach to the control of emotions. The teachers were assessed using the coping strategy, adult anger, and Goldstein’s skill streaming inventories. Lastly, the paper provides various recommendations on the sensitization of the Goldstein’s Social Skill streaming model to both the special and pre-service teachers to promote their knowledge about controlling emotions in conflicts.

Keywords: emotional control, Goldstein social skill streaming model, modeling technique, self- as-a-model, self-efficacy, self-regulation

Procedia PDF Downloads 31
10621 Switched Uses of a Bidirectional Microphone as a Microphone and Sensors with High Gain and Wide Frequency Range

Authors: Toru Shionoya, Yosuke Kurihara, Takashi Kaburagi, Kajiro Watanabe

Abstract:

Mass-produced bidirectional microphones have attractive characteristics. They work as a microphone as well as a sensor with high gain over a wide frequency range; they are also highly reliable and economical. We present novel multiple functional uses of the microphones. A mathematical model for explaining the high-pass-filtering characteristics of bidirectional microphones was presented. Based on the model, the characteristics of the microphone were investigated, and a novel use for the microphone as a sensor with a wide frequency range was presented. In this study, applications for using the microphone as a security sensor and a human biosensor were introduced. The mathematical model was validated through experiments, and the feasibility of the abovementioned applications for security monitoring and the biosignal monitoring were examined through experiments.

Keywords: bidirectional microphone, low-frequency, mathematical model, frequency response

Procedia PDF Downloads 553
10620 Politics of Violence and Terrorism in the Nigeria Democracy and Its Implications on National Peace and Security

Authors: Felix O. Akinboyewa

Abstract:

To say that Nigeria is faced with the problem of domestic terrorism is to say the obvious. The spate of political assassination during the fourth republic (1999-2010) is representative of what has become a growing trend. In this research, an attempt was made to examine the problems of political assassination within the context of significant categories of domestic-related terrorism in Nigeria Democracy. The central questions are: What exactly are the nature of political violence and terrorist act in the Nigeria nascent democracy? Was there any factor responsible for the politics of violence and terrorist act in the Nigeria democracy? What implications can the political violence and terrorist act have on democratic consolidation, national peace, and security? What solutions can be proffered to eradicate terrorist act and political violence in the Nigeria democracy? The study adopted a descriptive survey design which falls within the empirical research methodology. The sample size of the study consisted of 220 subjects randomly selected. The main instruments used were questionnaire and interview schedule. Data generated from the study were analyzed using descriptive statistics such as percentage and tables. The research findings showed that unemployed youths and the members of Nigeria Union of Road Transport Workers (NURTW) were the major actors in political violence in Nigeria. They have access to weapons and ammunitions which they use to terrorize the populace. The research showed that factors responsible for the political violence and terrorism in Nigeria are: poor electoral administration; election rigging; poor security system; religious and ethnic sentiment; problems of poverty and unemployment; over-exuberance and low level of education. The study also showed that electoral violence affects smooth running democracy in Nigeria. On the measures to be taken to eradicate political violence and terrorism in Nigeria, the research showed that provision of employment opportunities would go a long way to solving the problem. Civil society as an important institution can help to reduce incidence of political violence in Nigeria. Also, government has greater role to play. The study concludes that adherence to the proffered suggestions would reduce the level of political violence and terrorist act in Nigeria.

Keywords: consolidation, democracy, peace, security, terrorism, violence

Procedia PDF Downloads 127
10619 The Use of YouTube and Its Relation to Changing the Kuwaiti Children’s Social Values from Parents’ Perspectives: Field Study

Authors: Laila Alkhayat

Abstract:

In this study, the researcher explored the positive and negative effects of children watching YouTube on changing social values from the perspective of parents in Kuwait. This study also explored whether any correlation exists between changed values from watching YouTube and the following variables: relationship with a child, social situation, school level, gender, and age. The researcher collected data from 286 questionnaires distributed randomly to parents in Kuwait. The results of the study show that parents face many disadvantages when dealing with children watching YouTube, such as children spending too much time in front of screens, inability to organize bedtime, and children’s social isolation. However, the researcher found some positives come from watching YouTube, such as learning new information, enabling children to search for new information, and introducing children to the culture of their society and other cultures around them. Moreover, this study found that boys are more likely to have negative viewing habits than girls. Given the results, this study shows that the biggest impact on social values from children watching YouTube is that they are preoccupied with watching YouTube and they waste time, which makes them feel disturbed, and this affects the value of time management and delays children’s sleeping times. This study concludes that watching YouTube simultaneously has negative and positive effects on changing social values, but it plays a negative role in changing social values of children from the parents’ perspective.

Keywords: YouTube, children, social value, social media effects

Procedia PDF Downloads 161
10618 Perceived Risks in Business-to-Consumer Online Contracts: An Empirical Study in Saudi Arabia

Authors: Shaya Alshahrani

Abstract:

Perceived risks play a major role in consumer intentions, behaviors, attitudes, and decisions about online shopping in the KSA. This paper investigates the influence of six perceived risk dimensions on Saudi consumers: product risk, information risk, financial risk, privacy and security risk, delivery risk, and terms and conditions risk empirically. To ensure the success of this study, a random survey was distributed to reflect the consumers’ perceived risk and to enable the generalization of the results. Data were collected from 323 respondents in the Kingdom of Saudi Arabia (KSA): 50 who had never shopped online and 273 who had done so. The results indicated that all six risks influenced the respondents’ perceptions of online shopping. The non-online shoppers perceived financial and delivery risks as the most significant barriers to online shopping. This was followed closely by performance, information, and privacy and security risks. Terms and conditions were perceived as less significant. The online consumers considered delivery and performance risks to be the most significant influences on internet shopping. This was followed closely by information and terms and conditions. Financial and privacy and security risks were perceived as less significant. This paper argues that introducing adequate legal solutions to addressing related problems arising from this study is an urgent need. This may enhance consumer trust in the KSA online market, increase consumers’ intentions regarding online shopping, and improve consumer protection.

Keywords: perceived risk, online contracts, Saudi Arabia, consumer protection

Procedia PDF Downloads 152
10617 An Examination of Business Ethics and Corporate Social Responsibility: A Case Study of Zenith Bank PLC Jalingo

Authors: Abubakar Mohammed Bakoji

Abstract:

The paper examine business ethics through it pursuit for corporate social responsibility to the society in which the business long existed, Zenith bank PLC was selected as case study for it longer period of its business in the state, in order to achieve the research objective of the paper which sought the following: i. To examine relationship between business ethics and corporate social responsibility in Zenith bank PLC Jalingo; ii. To establish whether or not such ethics statement that acclaim corporate social responsibility are adhere to by the Zenith bank PLC Jalingo; iii. To determine the benefit drive by the society on the corporate social responsibility of Zenith bank PLC Jalingo to the people of the state of their operation. The research was conducted using qualitative research design approach, where convenience sampling technique was adopted using semi structured interview to one of the key staff of Zenith bank PLC Jalingo and five other beneficiaries of Zenith bank PLC corporate social responsibility projects served as respondents. The data obtained was analyze using content analysis and the result of the findings revealed that Zenith bank PLC has a Good business ethics and they adhere to the ethics, that they have completed several viable projects to the state as their corporate social responsibility and the beneficiaries and the respondents beneficiaries has confirmed and have produced evidence of how the projects has assisted in stifle their hardship. Hence, business ethics has a significant relationship with corporate social responsibility in Zenith bank PLC Jalingo.

Keywords: business ethics, Corporate Social Responsibility, Zenith Bank PLC, business ethics

Procedia PDF Downloads 486
10616 The Impact of Technology on Cultural Heritage among Preschool Children

Authors: Adenike Akinrotimi

Abstract:

Globally, education has been identified as vital tool for any form of development for any society (community); be it economic, social, political and cultural development. It is the determinant level of prosperity, welfare, security and sustenance of the people of a particular community. Education could be formal, informal and non-formal. Cultural development of an individual and of the community as it were is a lifelong process, where individual learns from daily experiences, exposure to the environment at home, at work, at play and it enriches human and environmental potentials. This type of education can be referred to as cultural heritage. It is built on learner participation and assimilation. Preschool programme also referred to as Early Childhood Education is critical to holistic development of a child cultural development inclusive. This paper examines the impact that technology has on cultural heritage among preschool children.

Keywords: cultural heritage, education, pre-school, technology

Procedia PDF Downloads 402
10615 Implementation and Performance Analysis of Data Encryption Standard and RSA Algorithm with Image Steganography and Audio Steganography

Authors: S. C. Sharma, Ankit Gambhir, Rajeev Arya

Abstract:

In today’s era data security is an important concern and most demanding issues because it is essential for people using online banking, e-shopping, reservations etc. The two major techniques that are used for secure communication are Cryptography and Steganography. Cryptographic algorithms scramble the data so that intruder will not able to retrieve it; however steganography covers that data in some cover file so that presence of communication is hidden. This paper presents the implementation of Ron Rivest, Adi Shamir, and Leonard Adleman (RSA) Algorithm with Image and Audio Steganography and Data Encryption Standard (DES) Algorithm with Image and Audio Steganography. The coding for both the algorithms have been done using MATLAB and its observed that these techniques performed better than individual techniques. The risk of unauthorized access is alleviated up to a certain extent by using these techniques. These techniques could be used in Banks, RAW agencies etc, where highly confidential data is transferred. Finally, the comparisons of such two techniques are also given in tabular forms.

Keywords: audio steganography, data security, DES, image steganography, intruder, RSA, steganography

Procedia PDF Downloads 296
10614 The Role of Social Parameters in the Choice of Address Forms Used in Kinship Domain in Punjab, Pakistan

Authors: Ana Ramsha, Samrah Hidayat

Abstract:

This study examines the role of social parameters in the choice of address forms used in kinship domain in Punjab, Pakistan. The study targeted 140 respondents in order to test the impact of social factors along with the regional differences in the choices of address forms in kinship domain. Statistical analyses are done by applying t-test for gender in relation to choices of address forms and ANOVA for age, income, education and social class. The study finds out that there is a strong connection of different social parameters not only with language use and practice but also in choices and use of address forms, especially in kinship relationships. Moreover, it is highlighted that gender does not influence in the choices of address forms, even the participants belonging to young and middle categories show no significant difference with regard to the choices of address form despite the fact that all the factors and parameters exert influence on the choices of address forms. Hence address forms as being one of the major traits of language and society is affected by all the social factors around and regional differences are also most important as they give identity and ethnicity to the society.

Keywords: address forms, kinship, social parameters, linguistics

Procedia PDF Downloads 136
10613 Applying Multivariate and Univariate Analysis of Variance on Socioeconomic, Health, and Security Variables in Jordan

Authors: Faisal G. Khamis, Ghaleb A. El-Refae

Abstract:

Many researchers have studied socioeconomic, health, and security variables in the developed countries; however, very few studies used multivariate analysis in developing countries. The current study contributes to the scarce literature about the determinants of the variance in socioeconomic, health, and security factors. Questions raised were whether the independent variables (IVs) of governorate and year impact the socioeconomic, health, and security dependent variables (DVs) in Jordan, whether the marginal mean of each DV in each governorate and in each year is significant, which governorates are similar in difference means of each DV, and whether these DVs vary. The main objectives were to determine the source of variances in DVs, collectively and separately, testing which governorates are similar and which diverge for each DV. The research design was time series and cross-sectional analysis. The main hypotheses are that IVs affect DVs collectively and separately. Multivariate and univariate analyses of variance were carried out to test these hypotheses. The population of 12 governorates in Jordan and the available data of 15 years (2000–2015) accrued from several Jordanian statistical yearbooks. We investigated the effect of two factors of governorate and year on the four DVs of divorce rate, mortality rate, unemployment percentage, and crime rate. All DVs were transformed to multivariate normal distribution. We calculated descriptive statistics for each DV. Based on the multivariate analysis of variance, we found a significant effect in IVs on DVs with p < .001. Based on the univariate analysis, we found a significant effect of IVs on each DV with p < .001, except the effect of the year factor on unemployment was not significant with p = .642. The grand and marginal means of each DV in each governorate and each year were significant based on a 95% confidence interval. Most governorates are not similar in DVs with p < .001. We concluded that the two factors produce significant effects on DVs, collectively and separately. Based on these findings, the government can distribute its financial and physical resources to governorates more efficiently. By identifying the sources of variance that contribute to the variation in DVs, insights can help inform focused variation prevention efforts.

Keywords: ANOVA, crime, divorce, governorate, hypothesis test, Jordan, MANOVA, means, mortality, unemployment, year

Procedia PDF Downloads 279
10612 The Online Power of Values: Adolescents’ Values as Predicting Factors of Their Online Bystanders’ Behavior While Witnessing Cyberbullying

Authors: Sharon Cayzer-Haller, Shir Ginosar-Yaari, Ariel Knafo-Noam

Abstract:

The 21st century emerged as the digital century, and it is marked by a wide range of technological developments and changes, followed by potential changes in human communication skills. This technological revolution has changed human means of communication in many different ways: children and adolescents are spending much of their time in front of screens, participating in all sorts of online activities (even more so since the outbreak of COVID-19). The current study focuses on the role of values in adolescents' online bystanders' behavior. Values are cognitive, abstract representations of desirable goals that motivate behavior, and we hypothesized finding significant associations between specific values and differential online bystanders' feelings and behavior. Data was collected through online questionnaires that measured the participants' values, using Schwartz's short version of the Portrait Values Questionnaire (Schwartz, 2012). Participants’ online behavior was assessed in a questionnaire addressing reactions to situations of cyber shaming and cyberbullying, and specifically positive feelings and pro-social behavior (e.g., more supportive reactions) toward the victims, as opposed to different offensive behavioral reactions (such as laughing at the victim or ignoring the situation). Participants were recruited with a commercial research panel company, and 308 Israeli adolescents' values and online behavior were examined (mean age 15.2). As hypothesized, results show significant associations between self-transcendence values (universalism and benevolence) and conservation values (conformity, tradition, and security). These two groups of values were positively correlated with pro-social bystanders' feelings and behavior. On the opposite side of the values scale, the value of power was negatively associated with the participants' pro-social behavior, and positively associated with offensive behavioral reactions. Further research is needed, but we conclude that values serve as crucial guiding factors in directing adolescents' online feelings and behavior.

Keywords: adolescents, values, cyberbullying, online behavior, power

Procedia PDF Downloads 70
10611 The Role of Cognitive Control and Social Camouflage Associated with Social Anxiety Autism Spectrum Conditions

Authors: Siqing Guan, Fumiyo Oshima, Eiji Shimizu, Nozomi Tomita, Toru Takahashi, Hiroaki Kumano

Abstract:

Risk factors for social anxiety in autism spectrum conditions involve executive attention, emotion regulation, and thought regulation as processes of cognitive dysregulation. Social camouflaging behaviors as strategies used to mask and/or compensate for autism characteristics during social interactions in autism spectrum conditions have also been emphasized. However, the role of cognitive dysregulation and social camouflaging related to social anxiety in autism spectrum conditions has not been clarified. Whether these factors are specific to social anxiety in autism spectrum conditions or common to social anxiety independent of autism spectrum conditions needs to be clarified. Here, we explored risk factors specific to social anxiety in autism spectrum conditions and general risk factors for social anxiety independent of autism spectrum conditions. From the Japanese participants in early adulthood (age=18~39) of the online survey in Japan, those who exceeded the Japanese version Autism-Spectrum Quotient cutoff (33 points or more )were divided into the autism spectrum conditions group (ASC; N=255, mean age=32.08, SD age=5.16)and those who did not exceed the cutoff were divided into the non-autism spectrum conditions group (Non-ASC; N=255, mean age=31.70, SD age=5.09). Using the Japanese versions of the Social Phobia Scale, the Social Interaction Anxiety Scale, and the Short Fear of Negative Evaluation Scale, a composite score for social anxiety was calculated using a method of principal. We also measured emotional control difficulties using the Difficulties in Emotion Regulation Scale, executive attention using the Effortful Control Scale for Adults, rumination using the Rumination-Reflection Questionnaire, and worry using the Penn State Worry Questionnaire. This study was passed through the review of the Ethics Committee. No conflicts of interest. Multiple regression analysis with forced entry method was used to predict social anxiety in the ASC and non-ASC groups separately, based on executive attention, emotion dysregulation, worry, rumination, and social camouflage. In the ASC group, emotion dysregulation (β=.277, p<.001), worry (β=.162, p<.05), assimilation (β=.308, p<.001) and masking (β=.275, p<.001) were significant predictors of social anxiety (F (7,247) = 45.791, p <.001, R2=.565). In the non-ASC groups,emotion dysregulation (β=.171, p<.05), worry (β=.344,p <.001), assimilation (β=.366,p <.001) and executive attention (β=-.132,p <.05) were significant predictors of social anxiety (F (7,207) =47.333, p <.001, R2=.615).The findings suggest that masking was shown to be a risk factor for social anxiety specific to autism spectrum conditions, while emotion dysregulation, worry, and assimilation were shown to be common risk factors for social anxiety, regardless of autism spectrum conditions. In addition, executive attention is a risk factor for social anxiety without autism spectrum conditions.

Keywords: autism spectrum, cognitive control, social anxiety, social camouflaging

Procedia PDF Downloads 212
10610 Association of Social Data as a Tool to Support Government Decision Making

Authors: Diego Rodrigues, Marcelo Lisboa, Elismar Batista, Marcos Dias

Abstract:

Based on data on child labor, this work arises questions about how to understand and locate the factors that make up the child labor rates, and which properties are important to analyze these cases. Using data mining techniques to discover valid patterns on Brazilian social databases were evaluated data of child labor in the State of Tocantins (located north of Brazil with a territory of 277000 km2 and comprises 139 counties). This work aims to detect factors that are deterministic for the practice of child labor and their relationships with financial indicators, educational, regional and social, generating information that is not explicit in the government database, thus enabling better monitoring and updating policies for this purpose.

Keywords: social data, government decision making, association of social data, data mining

Procedia PDF Downloads 375
10609 Structural Stress of Hegemon’s Power Loss: A Pestle Analysis for Pacification and Security Policy Plan

Authors: Sehrish Qayyum

Abstract:

Active military power contention is shifting to economic and cyberwar to retain hegemony. Attuned Pestle analysis confirms that structural stress of hegemon’s power loss drives a containment approach towards caging actions. Ongoing diplomatic, asymmetric, proxy and direct wars are increasing stress hegemon’s power retention due to tangled military and economic alliances. It creates the condition of catalepsy with defective reflexive control which affects the core warfare operations. When one’s own power is doubted it gives power to one’s own doubt to ruin all planning either done with superlative cost-benefit analysis. Strategically calculated estimation of Hegemon’s power game since the early WWI to WWII, WWII-to Cold War and then to the current era in three chronological periods exposits that Thucydides’s trap became the reason for war broke out. Thirst for power is the demise of imagination and cooperation for better sense to prevail instead it drives ashes to dust. Pestle analysis is a wide array of evaluation from political and economic to legal dimensions of the state matters. It helps to develop the Pacification and Security Policy Plan (PSPP) to avoid hegemon’s structural stress of power loss in fact, in turn, creates an alliance with maximum amicable outputs. PSPP may serve to regulate and pause the hurricane of power clashes. PSPP along with a strategic work plan is based on Pestle analysis to deal with any conceivable war condition and approach for saving international peace. Getting tangled into self-imposed epistemic dilemmas results in regret that becomes the only option of performance. It is a generic application of probability tests to find the best possible options and conditions to develop PSPP for any adversity possible so far. Innovation in expertise begets innovation in planning and action-plan to serve as a rheostat approach to deal with any plausible power clash.

Keywords: alliance, hegemon, pestle analysis, pacification and security policy plan, security

Procedia PDF Downloads 109
10608 Self-Serving or Self-Effacing: An Analysis of the Zimbabwe-United Kingdom Diaspora`S Role in Human Rights Advocacy

Authors: J.T. Chivanga

Abstract:

This paper conceptualizes the significance of human rights activism by the Zimbabwean diaspora in the United Kingdom by analyzing how the diaspora advocates for the promotion of the rights of the people in Zimbabwe. It critiques the strategic essentialism theory that is used by the government of Zimbabwe as a basis to discredit the work of transnational advocacy groups. The research advances this position by articulating that the diaspora does not falsify nor simplify them to garner external support on the human rights situation in Zimbabwe. It establishes and shows the significance of transnational advocacy by articulating how the Zimbabwean diaspora addresses and brings to the attention of the international community human rights violations in Zimbabwe that would otherwise not have seen the light of day due to the absence of a conducive environment in that country that stifles the organization of protests under repressive laws such as the public order and security act of 2009.

Keywords: strategic essentialism, transnational advocacy, public order and security act, Zimbabwe diaspora

Procedia PDF Downloads 243
10607 Comparing the Effectiveness of Social Skills Training and Stress Management on Self Esteem and Agression in First Grade Students of Iranian West High School

Authors: Hossein Nikandam Kermanshah, Babak Samavatian, Akbar Hemmati Sabet, Mohammad Ahmadpanah

Abstract:

This is a quasi-experimental study that has been conducted in order to compare the effectiveness of social skills training and stress management training on self-esteem and aggression in first grade high school students. Forty-five people were selected from research community and were put randomly in there groups of social skills training, stress management training and control ones. Collecting data tools in this study was devise, self-esteem and AGQ aggression questionnaire. Self-esteem and aggression questionnaires has been conducted as the pre-test and post-test. Social skills training and stress management groups participated in eight 1.5 hour session in a week. But control group did not receive any therapy. For descriptive analysis of data, statistical indicators like mean, standard deviation were used, and in inferential statistics level multi variable covariance analysis have been used. The finding result show that group training social skills and stress management is significantly effective on the self-esteem and aggression, there is a meaningful difference between training social skills and stress management on self-esteem that the preference is with group social skills training, in the difference between group social skills training and stress management on aggression, the preference is with group stress management.

Keywords: social skill training, stress management training, self-esteem aggression, psychological sciences

Procedia PDF Downloads 472
10606 Social Media and the Future of Veganism Influence on Gender Norms

Authors: Athena Johnson

Abstract:

Veganism has seen a rapid increase in members over recent years. Understanding the mechanisms of social change associated with these dietary practices in relation to gender is significant as these groups may seem small, but they have a large impact as they influence many and change the food market. This research article's basic methodology is primarily a deep article research literature review with empirical research. The research findings show that the popularity of veganism is growing, in large part due to the extensive use of social media, which dispels longstanding gendered connotations with food, such as the correlations between meat and masculinity.

Keywords: diversity, gender roles, social media, veganism

Procedia PDF Downloads 117
10605 Impacts of Electronic Dance Music towards Social Harmony: The Malaysian Perspective

Authors: Kok Meng Ng, Sulung Veronica

Abstract:

Electronic Dance Music (EDM), a musical event that so sought-after amongst the youth, is getting prevailed around the world. The emergence of this à la mode event has magnetized lots of attentions from the media as well as the public due to its high probabilities in creating social problems and menacing social harmony of one destination, for instance, two death cases occurred during the EDM events in Malaysia caused a feeling of consternation of the society. The arguments over the impacts of such events towards the society are endless. This paper focuses on the study of the impacts of EDM towards social harmony in Klang Valley area, Malaysia by scrutinizing the contradiction of statements from several experts and the local communities. This study sampled 15-20 people that represent different social background with face-to-face and online interview through snowball sampling method. This study helps to understand the social context as a whole based on the impacts of EDM events that take place in Malaysia. It also provides valuable information to EDMs’ organizer as well as local authorities for a proper event management to minimize EDM impacts towards society as part of the sustainable growth of the event industry.

Keywords: electronic dance music, social harmony, impacts, Klang Valley

Procedia PDF Downloads 264
10604 Variance-Aware Routing and Authentication Scheme for Harvesting Data in Cloud-Centric Wireless Sensor Networks

Authors: Olakanmi Oladayo Olufemi, Bamifewe Olusegun James, Badmus Yaya Opeyemi, Adegoke Kayode

Abstract:

The wireless sensor network (WSN) has made a significant contribution to the emergence of various intelligent services or cloud-based applications. Most of the time, these data are stored on a cloud platform for efficient management and sharing among different services or users. However, the sensitivity of the data makes them prone to various confidentiality and performance-related attacks during and after harvesting. Various security schemes have been developed to ensure the integrity and confidentiality of the WSNs' data. However, their specificity towards particular attacks and the resource constraint and heterogeneity of WSNs make most of these schemes imperfect. In this paper, we propose a secure variance-aware routing and authentication scheme with two-tier verification to collect, share, and manage WSN data. The scheme is capable of classifying WSN into different subnets, detecting any attempt of wormhole and black hole attack during harvesting, and enforcing access control on the harvested data stored in the cloud. The results of the analysis showed that the proposed scheme has more security functionalities than other related schemes, solves most of the WSNs and cloud security issues, prevents wormhole and black hole attacks, identifies the attackers during data harvesting, and enforces access control on the harvested data stored in the cloud at low computational, storage, and communication overheads.

Keywords: data block, heterogeneous IoT network, data harvesting, wormhole attack, blackhole attack access control

Procedia PDF Downloads 90
10603 The Touristic Development of the Archaeological and Heritage Areas in Alexandria City, Egypt

Authors: Salma I. Dwidar, Amal A. Abdelsattar

Abstract:

Alexandria city is one of the greatest cities in the world. It confronted different civilizations throughout the ages due to its special geographical location and climate which left many archaeological areas of great heritage (Ptolemaic, Greek, Romanian, especially sunken monuments, Coptic, Islamic, and finally, the Modern). Also, Alexandria city contains areas with different patterns of urban planning, both Hellenistic and compacted planning which merited the diversity in planning. Despite the magnitude of this city, which contains all the elements of tourism, the city was not included in the tourism map of Egypt properly comparing with similar cities in Egypt. This paper discusses the importance of heritage areas in Alexandria and the relationship between heritage areas and modern buildings. It highlights the absence of a methodology to deal with heritage areas as touristic areas. Also, the paper aims to develop multiple touristic routes to visit archaeological areas and other sights of significance in Alexandria. The research methodology is divided into two main frameworks. The first framework is a historical study of the urban development of Alexandria and the most important remaining monuments throughout the ages, as well as an analytical study of sunken monuments and their importance in increasing the rate of tourism. Moreover, it covers a study of the importance of the Library of Alexandria and its effect on the international focus of the city. The second framework focuses on the proposal of some tourism routes to visit the heritage areas, archaeological monuments, sunken monuments and the sights of Alexandria. The study concludes with the proposal of three tourism routes. The first route, which is the longest one, passes by all the famous monuments of the city as well as its modern sights. The second route passes through the heritage areas, sunken monuments, and Library of Alexandria. The third route includes the sunken monuments and Library of Alexandria. These three tourism routes will ensures the touristic development of the city which leads to the economic growth of the city and the country.

Keywords: archeological buildings, heritage buildings, heritage tourism, planning of Islamic cities

Procedia PDF Downloads 144
10602 A New Social Vulnerability Index for Evaluating Social Vulnerability to Climate Change at the Local Scale

Authors: Cuong V Nguyen, Ralph Horne, John Fien, France Cheong

Abstract:

Social vulnerability to climate change is increasingly being acknowledged, and proposals to measure and manage it are emerging. Building upon this work, this paper proposes an approach to social vulnerability assessment using a new mechanism to aggregate and account for causal relationships among components of a Social Vulnerability Index (SVI). To operationalize this index, the authors propose a means to develop an appropriate primary dataset, through application of a specifically-designed household survey questionnaire. The data collection and analysis, including calibration and calculation of the SVI is demonstrated through application in case study city in central coastal Vietnam. The calculation of SVI at the fine-grained local neighbourhood scale provides high resolution in vulnerability assessment, and also obviates the need for secondary data, which may be unavailable or problematic, particularly at the local scale in developing countries. The SVI household survey is underpinned by the results of a Delphi survey, an in-depth interview and focus group discussions with local environmental professionals and community members. The research reveals inherent limitations of existing SVIs but also indicates the potential for their use in assessing social vulnerability and making decisions associated with responding to climate change at the local scale.

Keywords: climate change, local scale, social vulnerability, social vulnerability index

Procedia PDF Downloads 440