Search results for: online threats
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3328

Search results for: online threats

1318 The Role of Celebrity Endorser in Men's Grooming Communication

Authors: Susana Marques, Cleide Abreu

Abstract:

Presently, more than ever, men’s grooming is seen as a broad category. The problem comes when the previous research about male consumer behavior have neglected some aspects in this subject. The purpose of this investigation is to examine the role of celebrity endorsement in men’s grooming communication to Generation Y. After identifying some gaps in the literature, with regard to this contemporary subject, the most important variables were defined in order to develop the investigation and draw conclusions through statistical analysis and validation, about the role celebrity endorsement as source of credibility in men’s grooming communication. According to the design and methodology, this research was sustained through in depth marketing analysis (secondary data), and primary data collection via online questionnaire, whereby 168 male respondents, from Brazil and Portugal, were exposed to some advertisement pieces in order to express their opinion and feelings. The findings reveal all the relationships among the variables, suggested by the literature, have occurred, presenting a significant relationship in terms of Source Credibility scale dimensions – attractiveness, trustworthiness and expertise. This paper aims to contribute to the existing literature with important conclusions about the role of celebrity endorsement and its credibility in men’s grooming advertisement.

Keywords: communication, celebrity endorsement, men’s grooming, consumer behavior

Procedia PDF Downloads 241
1317 Exploring the Correlation between Human Security, Human Rights and Justice in Addressing and Remedying Contemporary Challenges in Africa

Authors: Sikhumbuzo Zondi, Serges A. Kamga

Abstract:

Human security and human rights are mutually reinforcing concepts given that human security addresses questions related to human conditions such as the safety of individuals and the protection of individual rights and civil liberties. It does this by suggesting that the proper referent for security should be the individual and not the nation-state, due to the individual’s vulnerability to threats such as malnutrition and poverty, conflicts, exploitation and marginalization, despotism and climate change. Due to the primacy of the individual, human security comfortably expand to the notion of social justice, given that for far too-long, many individuals around the world have been denied of their basic human rights through racial discrimination, unfair labour and segregation policies and as a result encountered widespread social, environmental and economic injustices which are evident in the current structural division of the world between the developed north and the underdeveloped or developing south. In light of this view, ensuring freedom from want and freedom from fear, for all individuals is arguably the sound route to addressing and remedying the global ills of our time and a way to promoting human rights for all. The promotion of human security provides an important part of human/societal progress because inclusive security facilitates development and human rights protection, while insecurity reduces people’s growth and investment prospects and prolongs historical injustices. Therefore, this paper seeks to show that human security and human rights complements one another and that this correlation provides the necessary mechanisms for addressing and remedying the historical injustices that still affect most of the world’s population. It will look at linkages between human security and the individual right to equality and freedom from discrimination, right to life, liberty, and personal security; development; own property; adequate living standard; education; desirable work and to join trade unions; participate in government and in free elections; social security and equality before the law. The paper considers these human rights and liberties as vital for securing the core values of human life while at the same addressing socio-economic injustices that still persist in the contemporary world. The paper will be a desktop study using qualitative research methods on two case studies in Africa namely Cameroun and South Africa.

Keywords: justice, human security, human rights, injustices

Procedia PDF Downloads 166
1316 Collaborative Writing on Line with Apps During the Time of Pandemic: A Systematic Literature Review

Authors: Giuseppe Liverano

Abstract:

Today’s school iscalledupon to take the lead role in supporting students towards the formation of conscious identity and a sense of responsible citizenship, through the development of key competencies for lifelong learning A rolethatrequiresit to be ready for change and to respond to the ever new needs of students, by adopting new pedagogical and didactic models and new didactic devices. Information and Communication Technologies, in this sense, reveal themselves to be usefulresourcesthatpermit to focus attention on the learning of eachindividualstudentunderstoodas a dynamic and relational process of constructing shared and participatedmeanings. The use of collaborative writing apps represents a democratic and shared knowledge way of constructionthroughICTs. It promotes the learning of reading-writing, literacy, and the development of transversal competencies in an inclusive perspective peer-to-peer comparison and reflectionthatstimulates the transfer of thought into speech and writing, the transformation of knowledge through a trialogicalapproach to learning generates enthusiasm and strengthensmotivationItrepresents a “different” way of expressing the training needs which come from several disciplinary fields of subjects with different cultures. The contribution aims to reflect on the formative value of collaborative writing through apps and analyse some proposals on line at school during the time of pandemic in order to highlight their critical aspects and pedagogical perspectives.

Keywords: collaborative writing, formative value, online, apps, pandemic

Procedia PDF Downloads 153
1315 Analysis of Big Data on Leisure Activities and Depression for the Disabled

Authors: Hee-Jung Seo, Yunjung Lee, Areum Han, Heeyoung Park, Se-Hyuk Park

Abstract:

The purpose of this study was to analyze the relationship between happiness and depression among people with disabilities and to analyze the social phenomenon of leisure activities among them to promote physical and leisure activities for people with disabilities. The research methods included analyzing differences in happiness according to depression classification. A total of 281 people with disabilities were analyzed using SPSS WIN Ver. 29.0. In addition, the SumTrend platform was used to analyze terms related to 'leisure activities for the disabled.' The findings can be summarized into two main points: First, there were significant differences in happiness according to depression classification. Second, there were 20 mentions before COVID-19, 34 mentions after COVID-19, and currently 43 mentions, with high positive rates observed in each period. Based on these results, the following conclusions were drawn: First, measures for people with disabilities include strengthening online resources and services, social distancing response policies, improving accessibility, and providing support and financial assistance. Second, measures for non-disabled individuals emphasize the need for education and information provision, promoting dialogue and interaction, ensuring accessibility, and promoting inclusive cultural awareness and attitude change.

Keywords: leisure activities, individuals with disabilities, COVID-19 pandemic, depression

Procedia PDF Downloads 48
1314 Presenting Internals of Networks Using Bare Machine Technology

Authors: Joel Weymouth, Ramesh K. Karne, Alexander L. Wijesinha

Abstract:

Bare Machine Internet is part of the Bare Machine Computing (BMC) paradigm. It is used in programming application ns to run directly on a device. It is software that runs directly against the hardware using CPU, Memory, and I/O. The software application runs without an Operating System and resident mass storage. An important part of the BMC paradigm is the Bare Machine Internet. It utilizes an Application Development model software that interfaces directly with the hardware on a network server and file server. Because it is “bare,” it is a powerful teaching and research tool that can readily display the internals of the network protocols, software, and hardware of the applications running on the Bare Server. It was also demonstrated that the bare server was accessible by laptop and by smartphone/android. The purpose was to show the further practicality of Bare Internet in Computer Engineering and Computer Science Education and Research. It was also to show that an undergraduate student could take advantage of a bare server with any device and any browser at any release version connected to the internet. This paper presents the Bare Web Server as an educational tool. We will discuss possible applications of this paradigm.

Keywords: bare machine computing, online research, network technology, visualizing network internals

Procedia PDF Downloads 171
1313 Impact of Enhanced Business Models on Technology Companies in the Pandemic: A Case Study about the Revolutionary Change in Management Styles

Authors: Murat Colak, Berkay Cakir Saridogan

Abstract:

Since the dawn of modern corporations, almost every single employee has been working in the same loop, which contains three basic steps: going to work, providing the needs for the work, and getting back home. Only a small amount of people were able to break that standard and live outside the box. As the 2019 pandemic hit the Earth and most companies shut down their physical offices, that loop had to change for everyone. This means that the old management styles had to be significantly re-arranged to the "work from home" type of business methods. The methods include online conferences and meetings, time and task tracking using algorithms, globalization of the work, and, most importantly, remote working. After the global epidemic started, even the tech giants were concerned. Now, it can be seen those technology companies have an incredible step-up in their shares compared to the other companies because they know how to manage such situations even better than every other industry. This study aims to take the old traditional management styles in big companies and compare them with the post-covid methods (2019-2022). As a result of this comparison made using the annual reports and shared statistics, this study aims to explain why the winners of this crisis are the technology companies.

Keywords: Covid-19, technology companies, business models, remote work

Procedia PDF Downloads 63
1312 An Application of Content Analysis, SWOT Analysis, and the TOPSIS Method: A Case Study of the 'Tourism Ambassador' Program in Indonesia

Authors: Gilang Maulana Majid

Abstract:

If a government program remains scientifically uncontested for a long time, it is likely that its effects will be far from expected as there is no concrete evaluation of the steps being taken. This article identifies how such a theory aptly describes the case of the 'tourism ambassador' program in Indonesia. Being set out as one of the tourism promotional means of many regional governments in Indonesia, this program is heavily criticized for being ineffective despite a large number of budgets being spent on an annual basis. Taking the program as a case study, this article applies content analysis, SWOT analysis, and TOPSIS as data analysis methods, with a total of 56 tourism ambassadors invited to become coders, respondents, and/or interviewees in this research. The study reveals the SWOT of the program, recognizes four strategies that can be taken to optimize the program's effects and prioritizes a strategy based on the preferences of the involved tourism ambassadors using TOPSIS. It is found that incorporation of technology such as the creation of an online platform is, among others, the most expected approach to be taken to solve the problems concerning tourism ambassador program. However, based on the costs and benefits of each strategy presented in the current study, each alternative appears to have trade-offs between one and another.

Keywords: Indonesia, optimization strategies, 'Tourism Ambassador' program, SWOT-TOPSIS

Procedia PDF Downloads 165
1311 Pupils´ Questions at School Attendance Beginning and Teachers´ Teaching Strategy

Authors: Marie Pavelková, Hana Lukášová

Abstract:

Pupils´ inquisitiveness at the beginning of their school attendance is reflected by characteristics of the questions they ask. Clearly most of the classroom communication sequences are initiated by the teacher. But the teaching process also includes questions initiated by pupils in the need to satisfy their need for knowledge. The purpose of our research is to present the results of our pre-research strategy of occurrence of pupil-initiated questions in math lessons at the lower elementary school level, and to reveal the extent to which they are influenced by the teacher´s teaching strategy. We used the research methods of direct and indirect observations of fifth year classes in primary school. We focused on questions asked by the pupils in their math lessons. Our research sample for the pre-research observation method was a collection of video recordings available online. We used them for analysing the nature of pupils´ questions identified there. On the basis of the analysis, we hereby present the results concerning the nature of pupils´ questions asked in math lessons on the lower elementary school level. The interpretation of the collected results will be the starting point for the selection of research strategies in the next research stages concerning pupils’ questions in the future.

Keywords: beginning of schooling, pre-research, questions of pupils, teaching strategy

Procedia PDF Downloads 369
1310 Design and Implementation of Remote Application Virtualization in Cloud Environments

Authors: Shuen-Tai Wang, Ying-Chuan Chen, Hsi-Ya Chang

Abstract:

Cloud computing is a paradigm of computing that shifts the way computing has been done in the past. The users can use cloud resources such as application software or storage space from the cloud without needing to own them. This paper is focused on solutions that are anticipated to introduce IaaS idea to build cloud base services and enable the individual remote user's applications in cloud environments, which appear as if they are running on the end user's local computer. The available features of application delivery solution have been developed based on our previous research on the virtualization technology to offer applications independent of location so that the users can work online, offline, anywhere, with appropriate device and at any time. This proposed effort has the potential to positively provide an efficient, resilience and elastic environment for cloud service. Users no longer need to burden the system managers and drastically reduces the overall cost of hardware and software licenses. Moreover, this flexible remote application virtualization service represents the next significant step to the mobile workplace, and it lets users access their applications remotely through cloud services anywhere. This is also made possible by the low administrative costs as well as relatively inexpensive end-user terminals and reduced energy expenses.

Keywords: cloud computing, IaaS, virtualization, application delivery

Procedia PDF Downloads 279
1309 Parental Negative Emotional States, Parenting Style and Child Emotional and Behavioural Problems: Australia-Indonesia Cross-Cultural Study

Authors: Yulina E. Riany, Divna Haslam, Matthew Sanders

Abstract:

This cross-cultural study aims to compare the level of parental depression and stress, parenting style use, and child emotional and behavioural problems between parents in Australia as an example of a Western country and parents in Indonesia as an example of Asian culture. A series of hierarchical regressions were undertaken to determine two models examining the factors that predict child problems residing in Australia (Model 1) and in Indonesia (Model 2). The online survey was completed by 179 parents in Australia and 448 parents in Indonesia. Results indicated that Australian parents reported higher levels of depression, authoritative parenting and higher levels of child misbehaviours compared to Indonesian parents. In comparison, Indonesian parents reported higher authoritarian parenting. Analyses performed to examine Model 1 and 2 revealed that parental negative emotional states and parenting style predicted child emotional and behavioural problems in both countries.

Keywords: cross-cutural study, parental stress, parenting, child misbehaviour

Procedia PDF Downloads 116
1308 Deep Learning and Accurate Performance Measure Processes for Cyber Attack Detection among Web Logs

Authors: Noureddine Mohtaram, Jeremy Patrix, Jerome Verny

Abstract:

As an enormous number of online services have been developed into web applications, security problems based on web applications are becoming more serious now. Most intrusion detection systems rely on each request to find the cyber-attack rather than on user behavior, and these systems can only protect web applications against known vulnerabilities rather than certain zero-day attacks. In order to detect new attacks, we analyze the HTTP protocols of web servers to divide them into two categories: normal attacks and malicious attacks. On the other hand, the quality of the results obtained by deep learning (DL) in various areas of big data has given an important motivation to apply it to cybersecurity. Deep learning for attack detection in cybersecurity has the potential to be a robust tool from small transformations to new attacks due to its capability to extract more high-level features. This research aims to take a new approach, deep learning to cybersecurity, to classify these two categories to eliminate attacks and protect web servers of the defense sector which encounters different web traffic compared to other sectors (such as e-commerce, web app, etc.). The result shows that by using a machine learning method, a higher accuracy rate, and a lower false alarm detection rate can be achieved.

Keywords: anomaly detection, HTTP protocol, logs, cyber attack, deep learning

Procedia PDF Downloads 208
1307 Application of FT-NIR Spectroscopy and Electronic Nose in On-line Monitoring of Dough Proofing

Authors: Madhuresh Dwivedi, Navneet Singh Deora, Aastha Deswal, H. N. Mishra

Abstract:

FT-NIR spectroscopy and electronic nose was used to study the kinetics of dough proofing. Spectroscopy was conducted with an optic probe in the diffuse reflectance mode. The dough leavening was carried out at different temperatures (25 and 35°C) and constant RH (80%). Spectra were collected in the range of wave numbers from 12,000 to 4,000 cm-1 directly on the samples, every 5 min during proofing, up to 2 hours. NIR spectra were corrected for scatter effect and second order derivatization was done to transform the spectra. Principal component analysis (PCA) was applied for the leavening process and process kinetics was calculated. PCA was performed on data set and loadings were calculated. For leavening, four absorption zones (8,950-8,850, 7,200-6,800, 5,250-5,150 and 4,700-4,250 cm-1) were involved in describing the process. Simultaneously electronic nose was also used for understanding the development of odour compounds during fermentation. The electronic nose was able to differential the sample on the basis of aroma generation at different time during fermentation. In order to rapidly differentiate samples based on odor, a Principal component analysis is performed and successfully demonstrated in this study. The result suggests that electronic nose and FT-NIR spectroscopy can be utilized for the online quality control of the fermentation process during leavening of bread dough.

Keywords: FT-NIR, dough, e-nose, proofing, principal component analysis

Procedia PDF Downloads 388
1306 Older Consumer’s Willingness to Trust Social Media Advertising: A Case of Australian Social Media Users

Authors: Simon J. Wilde, David M. Herold, Michael J. Bryant

Abstract:

Social media networks have become the hotbed for advertising activities due mainly to their increasing consumer/user base and, secondly, owing to the ability of marketers to accurately measure ad exposure and consumer-based insights on such networks. More than half of the world’s population (4.8 billion) now uses social media (60%), with 150 million new users having come online within the last 12 months (to June 2022). As the use of social media networks by users grows, key business strategies used for interacting with these potential customers have matured, especially social media advertising. Unlike other traditional media outlets, social media advertising is highly interactive and digital channel specific. Social media advertisements are clearly targetable, providing marketers with an extremely powerful marketing tool. Yet despite the measurable benefits afforded to businesses engaged in social media advertising, recent controversies (such as the relationship between Facebook and Cambridge Analytica in 2018) have only heightened the role trust and privacy play within these social media networks. Using a web-based quantitative survey instrument, survey participants were recruited via a reputable online panel survey site. Respondents to the survey represented social media users from all states and territories within Australia. Completed responses were received from a total of 258 social media users. Survey respondents represented all core age demographic groupings, including Gen Z/Millennials (18-45 years = 60.5% of respondents) and Gen X/Boomers (46-66+ years = 39.5% of respondents). An adapted ADTRUST scale, using a 20 item 7-point Likert scale, measured trust in social media advertising. The ADTRUST scale has been shown to be a valid measure of trust in advertising within traditional media, such as broadcast media and print media, and, more recently, the Internet (as a broader platform). The adapted scale was validated through exploratory factor analysis (EFA), resulting in a three-factor solution. These three factors were named reliability, usefulness and affect, and the willingness to rely on. Factor scores (weighted measures) were then calculated for these factors. Factor scores are estimates of the scores survey participants would have received on each of the factors had they been measured directly, with the following results recorded (Reliability = 4.68/7; Usefulness and Affect = 4.53/7; and Willingness to Rely On = 3.94/7). Further statistical analysis (independent samples t-test) determined the difference in factor scores between the factors when age (Gen Z/Millennials vs. Gen X/Boomers) was utilized as the independent, categorical variable. The results showed the difference in mean scores across all three factors to be statistically significant (p<0.05) for these two core age groupings: (1) Gen Z/Millennials Reliability = 4.90/7 vs. Gen X/Boomers Reliability = 4.34/7; (2) Gen Z/Millennials Usefulness and Affect = 4.85/7 vs Gen X/Boomers Usefulness and Affect = 4.05/7; and (3) Gen Z/Millennials Willingness to Rely On = 4.53/7 vs Gen X/Boomers Willingness to Rely On = 3.03/7. The results clearly indicate that older social media users lack trust in the quality of information conveyed in social media ads when compared to younger, more social media-savvy consumers. This is especially evident with respect to Factor 3 (Willingness to Rely On), whose underlying variables reflect one’s behavioral intent to act based on the information conveyed in advertising. These findings can be useful to marketers, advertisers, and brand managers in that the results highlight a critical need to design ‘authentic’ advertisements on social media sites to better connect with these older users in an attempt to foster positive behavioral responses from within this large demographic group – whose engagement with social media sites continues to increase year on year.

Keywords: social media advertising, trust, older consumers, internet studies

Procedia PDF Downloads 36
1305 The Meaning of Stillness: Based on the Errand Boy Project in Tibet during the Pandemic Quarantine in Shanghai in the Mayday Holiday

Authors: Mingyuan Duan

Abstract:

Many scholars have paid attention to the relationship between mobility and stillness, but most of them focus on stillness from the perspective of serving mobility. This study believes that more attention should be paid to the importance of stillness, and we suggest reexamining the meaning of stillness in terms of the value of stillness to people. The Errand Boy Project was launched by a social innovation enterprise called Bottle Dream during the May Day holiday in 2022. It linked volunteers from all over the world online to help people who are trapped at home due to the epidemic realize their outdoor wishes: get closer to nature and relieve their anxious mood. Taking Errand Boy in Tibet as a case study, this paper analyzes the emotional expressions and comments of people with limited mobility in the face of nature in the webcast room and explains the importance of stillness to humans from a non-human perspective. This study points out that the significance of stillness to human beings during the pandemic is composed of three aspects: the sense of solidity established by a steady mobile phone network connection, the stable possibility of wish fulfillment predicted by the periodic regularity of plant growth, and the transcendent spiritual power from the stable sacred mountain.

Keywords: stillness, non-human, pandemic, mobility

Procedia PDF Downloads 73
1304 Gawa Gawa Lang ‘Yan: A Qualitative Study of the Perception of Mental Health between Generations X and Z in Metro Manila, Philippines

Authors: Pierre Angelo Alino, Rafael Alejandro Ang, Maria Carmela Espanol, Dominic Gerard Ferreol, Jendrietch Adrian Lopez

Abstract:

This study aims to explore the differences in perception between Generation X and Generation Z towards mental health and mental health illnesses. Through this study, the researchers seek to identify and explore the differences that exist in the generational perception and determine the possible factors that influence the difference in perception. In order to achieve this, we conducted two focus group discussions (FGD), one composed of Generation X and the other composed of Generation Z. Participants for both focus group discussions were recruited through purposive sampling and online recruitment methods. In these discussions, they were asked questions relating to their personal history, experiences with mental health, and related illnesses, as well as their opinions regarding the subject matter. Afterwhich, we analyzed our data through a thematic analysis. Our study’s findings indicate notable differences in the perception of mental health as well as mental illness between the members of Generations X and Z. Additionally, factors such as culture, personal history, and intimate relationships influence the perceptions of mental health between generation groups.

Keywords: generational difference, mental health, mental health illness, perception

Procedia PDF Downloads 208
1303 From Parents to Pioneers: Examining Parental Impact on Entrepreneurial Traits in Latin America

Authors: Bert Seither

Abstract:

Entrepreneurship is a critical driver of economic growth, especially in emerging regions such as Latin America. This study investigates how parental influences, particularly parental individual entrepreneurial orientation (IEO), shape the entrepreneurial traits of Latin American entrepreneurs. By examining key factors like parental IEO, work ethic, parenting style, and family support, this research assesses how much of an entrepreneur's own IEO can be attributed to parental influence. The study also explores how socio-economic status and cultural context moderate the relationship between parental traits and entrepreneurial orientation. Data will be collected from 600 Latin American entrepreneurs via an online survey. This research aims to provide a comprehensive understanding of the intergenerational transmission of entrepreneurial traits and the broader socio-cultural factors that contribute to entrepreneurial success in diverse contexts. Findings from this study will offer valuable insights for policymakers, educators, and business leaders on fostering entrepreneurship across Latin America, providing practical applications for shaping entrepreneurial behavior through family influences.

Keywords: entrepreneurial orientation, parental influence, Latin American entrepreneurs, socio-economic status, cultural context

Procedia PDF Downloads 16
1302 Expectations of Unvaccinated Health Workers in Greece and the Question of Trust: A Qualitative Study of Vaccine Hesitancy

Authors: Sideri Katerina, Chanania Eleni

Abstract:

The reasons why people remain unvaccinated, especially health workers, are complex. In Greece, 2 percent of health workers (around 7,000) remain unvaccinated, despite the fact that for this group of people vaccination against COVID-19 is mandatory. In April 2022, the Greek health minister repeated that unvaccinated health care workers will remain suspended from their jobs ‘for as long as the pandemic lasts,’ explaining that the suspension of the workers in question was ‘entirely their choice’ and that health professionals who do not believe in vaccines ‘do not believe in their own science.’ Although policy circles around the world often link vaccine hesitancy to ignorance of science or misinformation, various recently published qualitative studies show that vaccine hesitancy is the result of a combination of factors, which include distrust towards elites and the system of innovation and distrust towards government. In a similar spirit, some commentators warn that labeling hesitancy as “anti-science” is bad politics. In this paper, we worked within the tradition of STS taking the view that people draw upon personal associations to enact and express civic concern with an issue, the enactment of public concern involves the articulation of threats to actors’ way of life, personal values, relationships, lived experiences, broader societal values and institutional structures. To this effect, we have conducted 27 in depth interviews with unvaccinated Greek health workers and we are in the process of conducting 20 more interviews. We have so far found that rather than a question of believing in ‘facts’ vaccine hesitancy reflects deep distrust towards those charged with the making of decisions and pharmaceutical companies and that emotions (rather than rational thinking) play a crucial role in the formation of attitudes and the making of decisions. We need to dig deeper so as to understand the causes of distrust towards technical government and the ways in which public(s) conceive of and want to be part in the politics of innovation. We particularly address the question of the effectiveness of mandatory vaccination of health workers and whether such top-down regulatory measures further polarize society, to finally discuss alternative regulatory approaches and governance structures.

Keywords: vaccine hesitancy, innovation, trust in vaccines, sociology of vaccines, attitude drivers towards scientific information, governance

Procedia PDF Downloads 73
1301 A Conceptual Framework for the Adoption of Information and Communication Technology for Anti-Corruption in the DR Congo

Authors: Itulelo Matiyabu Imaja, Patrick Ndayizigamiye, Manoj Maharaj

Abstract:

There are many catalysts of corruption. These include amongst others, lack of effective control measures to deter or detect corrupt behaviour. Literature suggests that ICT could assist in curbing corruption through the implementation of automated systems, citizens engagement through e-government and online media to name a few. In the Democratic Republic of Congo, lack of transparency and accountability in public funds collection and allocation contribute to corruption in funds mismanagement. Using the accountability theory and available literature, this paper analyses how Democratic Republic of Congo (DRC) institutions could be strengthened through ICT in order to deter instances of corruption. Findings reveal that DRC lacks reliable control, monitoring and evaluation mechanisms that could identify potentially corrupt behavior. In addition, citizens and civil society organizations who are meant to hold the institutions accountable are not given secure platform to express their views and potentially flag any corrupt behavior. Hence, the paper presents a preliminary conceptual framework that depicts how ICT could be used to strengthen current institutions to potentially deter corrupt behavior in public funds management in Congo.

Keywords: corruption, ICT adoption, transparency, DR Congo

Procedia PDF Downloads 184
1300 Firm-Created Social Media Communication and Consumer Brand Perceptions

Authors: Rabail Khalid

Abstract:

Social media has changed the business communication strategies in the corporate world. Firms are using social media to reach their maximum stakeholders in minimum time at different social media forums. The current study examines the role of firm-created social media communication on consumer brand perceptions and their loyalty to brand. An online survey is conducted through social media forums including Facebook and Twitter to collect data regarding social media communication of a well-reputed clothing company’s brand in Pakistan. A link is sent to 900 customers of that company. Out of 900 questionnaires, 534 were received. So, the response rate is 59.33%. During data screening and entry, 13 questionnaires are rejected due to incomplete answer. Therefore, 521 questionnaires are completed in all respect and seem to be helpful for the study. So, the positive response rate is 57.89%. The empirical results report positive and significant influence of company-generated social media communication on brand trust, brand equity, and brand loyalty. The findings of this study provide important information to the marketing professionals and brand managers to understand consumer behavior through social media communication.

Keywords: firm-created social media communication, brand trust, brand equity, consumer behavior, brand loyalty

Procedia PDF Downloads 386
1299 A Report on the Elearning Programme of the Irish College of General Practitioners Which Can Address Continuing Education Needs of Primary Care Physicians

Authors: Nicholas P. Fenlon, Aisling Lavelle, David Mclean, Margaret O'riordan

Abstract:

Background: The case for continuing professional development has been well made, and was formalized in Ireland in recent years through the enactment of the Medical Practitioner’s Act, which requires registered medical practitioners to complete a minimum of 50 hours CPD each year. The ICGP, who have been providing CPD opportunities to its members for many years, have responded to this need by developing a series of evidence-based, high-quality, multimedia modules across a range of clinical and non-clinical areas. (More traditional education opportunities are still being provided by the college also). Overview of Programme: The first module was released in September 2011, since when the eLearning program has grown steadily, and there are currently almost 20 modules available, with a further 5 in production. Each module contains three to six 10-minute video lessons, which use a combination of graphics, images, text, voice-over and clinical clips. These are supported by supplementary videos of expert pieces-to-camera, Q&As with content experts, clinical scenarios, external links and relevant documentation and other resources. Successful completion of MCQs will result in a Certificate of Completion, which can be printed or stored in Professional Competence portfolio. The Medical Practitioner’s Act requires doctors to gather CPD credits across 8 domains of practice, and various eLearning modules have been developed to address each. For instance, modules with a strong clinical content would include Management of Hypertension, Management of COPD, and Management of Asthma. Other modules focus on health promotion such as Promoting Smoking Cessation, Promoting Physical Activity, and Addressing Childhood Obesity. Modules where communication skills are keys include modules on Suicide Prevention and Management of Depression. Other modules, currently in development include non-clinical topics around risk management, including Confidentiality, Consent etc. Each module is developed by a core group, which includes where possible, a GP with a special interest in the area, and a content expert(s). The college works closely with a medical education consultant and a production company in developing and producing the modules. Modules can be accessed (with password) through the ICGP website and are available free to all ICGP members. Summary of Evaluation: There are over 1700 registered users to date (over 55% of College membership). The program was evaluated using an online survey in 2013 (N = 144/950 – 12%) and results were very positive overall but provided material for the further improvement of the program also. Future Plans: While knowledge can be imparted well through eLearning, skills and attitudes are more difficult to influence through an online environment. The college is now developing a series of linked workshops, which will lead to ICGP Professional Competence Awards. The first pilot workshop is scheduled for February 2015 and is Cardiology-themed. Participants will be required to complete the following 4 modules in advance of attending – Management of Hypertension, Management of Heart Failure, Promoting Smoking Cessation, and Promoting Physical Activity. The workshop will be case-based and interactive, addressing ECG Interpretation in General Practice. Conclusions: The ICGP have responded to members needs for high-quality evidence-based education delivered in a way that suits GPs.

Keywords: CPD opportunities, evidence-based, high quality, multimedia modules across a range of clinical and non-clinical areas, medical practitioner’s act

Procedia PDF Downloads 598
1298 Using Bidirectional Encoder Representations from Transformers to Extract Topic-Independent Sentiment Features for Social Media Bot Detection

Authors: Maryam Heidari, James H. Jones Jr.

Abstract:

Millions of online posts about different topics and products are shared on popular social media platforms. One use of this content is to provide crowd-sourced information about a specific topic, event or product. However, this use raises an important question: what percentage of information available through these services is trustworthy? In particular, might some of this information be generated by a machine, i.e., a bot, instead of a human? Bots can be, and often are, purposely designed to generate enough volume to skew an apparent trend or position on a topic, yet the consumer of such content cannot easily distinguish a bot post from a human post. In this paper, we introduce a model for social media bot detection which uses Bidirectional Encoder Representations from Transformers (Google Bert) for sentiment classification of tweets to identify topic-independent features. Our use of a Natural Language Processing approach to derive topic-independent features for our new bot detection model distinguishes this work from previous bot detection models. We achieve 94\% accuracy classifying the contents of data as generated by a bot or a human, where the most accurate prior work achieved accuracy of 92\%.

Keywords: bot detection, natural language processing, neural network, social media

Procedia PDF Downloads 115
1297 Chronic Renal Failure Associated with Heavy Metal Contamination of Drinking Water in Hail, Kingdom of Saudi Arabia

Authors: Elsayed A. M. Shokr, A. Alhazemi, T. Naser, Talal A. Zuhair, Adel A. Zuhair, Ahmed N. Alshamary, Thamer A. Alanazi, Hosam A. Alanazi

Abstract:

The main threats to human health from heavy metals are associated with exposure to Pb, Cd, Cu, Mo, Zn, Ni, Mn Co and Cr. is mainly via intake of drinking water being the most important source in most populations. These metals have been extensively studied and their effects on human health regularly reviewed by international bodies such as the WHO. Heavy metals have been used by humans for thousands of years. Although several adverse health effects of heavy metals have been known for a long time, exposure to heavy metals continues, and is even increasing in some parts of the world, in particular in less developed countries, though emissions have declined in most developed countries over the last 100 years. A strong relationship between contaminated drinking water with heavy metals from some of the stations of water shopping in Hail, KSA and chronic diseases such as renal failure, liver cirrhosis, and chronic anemia has been identified in this study. These diseases are apparently related to contaminant drinking water with heavy metals such as Pb, Cd, Cu, Mo, Zn, Ni, Mn Co and Cr. Renal failure is related to contaminate drinking water with lead and cadmium, liver cirrhosis to copper and molybdenum, and chronic anemia to copper and cadmium. Recent data indicate that adverse health effects of cadmium exposure may occur at lower exposure levels than previously anticipated, primarily in the form of kidney damage but possibly also bone effects and fractures. The general population is primarily exposed to mercury via drinking water being a major source of methyl mercury exposure, and dental amalgam. During the last century lead, cadmium, zinc, iron and arsenic is mainly via intake of drinking water being the most important source in most populations. Long-term exposure to lead, cadmium, zinc, iron and arsenic in drinking-water is mainly related to primarily in the form of kidney damage. Studies of these diseases suggest that abnormal incidence in specific areas is related to toxic materials in the groundwater and thereby led to the contamination of drinking water in these areas.

Keywords: heavy metals, liver functions, kidney functions and chronic renal failure, hail, renal, water

Procedia PDF Downloads 319
1296 Effect of Repellent Coatings, Aerosol Protective Liners, and Lamination on the Properties of Chemical/Biological Protective Textiles

Authors: Natalie Pomerantz, Nicholas Dugan, Molly Richards, Walter Zukas

Abstract:

The primary research question to be answered for Chemical/Biological (CB) protective clothing, is how to protect wearers from a range of chemical and biological threats in liquid, vapor, and aerosol form, while reducing the thermal burden. Currently, CB protective garments are hot, heavy, and wearers are limited by short work times in order to prevent heat injury. This study demonstrates how to incorporate different levels of protection on a material level and modify fabric composites such that the thermal burden is reduced to such an extent it approaches that of a standard duty uniform with no CB protection. CB protective materials are usually comprised of several fabric layers: a cover fabric with a liquid repellent coating, a protective layer which is comprised of a carbon-based sorptive material or semi-permeable membrane, and a comfort next-to-skin liner. In order to reduce thermal burden, all of these layers were laminated together to form one fabric composite which had no insulative air gap in between layers. However, the elimination of the air gap also reduced the CB protection of the fabric composite. In order to increase protection in the laminated composite, different nonwoven aerosol protective liners were added, and a super repellent coating was applied to the cover fabric, prior to lamination. Different adhesive patterns were investigated to determine the durability of the laminate with the super repellent coating, and the effect on air permeation. After evaluating the thermal properties, textile properties and protective properties of the iterations of these fabric composites, it was found that the thermal burden of these materials was greatly reduced by decreasing the thermal resistance with the elimination of the air gap between layers. While the level of protection was reduced in laminate composites, the addition of a super repellent coating increased protection towards low volatility agents without impacting thermal burden. Similarly, the addition of aerosol protective liner increased protection without reducing water vapor transport, depending on the nonwoven used, however, the air permeability was significantly decreased. The balance of all these properties and exploration of the trade space between thermal burden and protection will be discussed.

Keywords: aerosol protection, CBRNe protection, lamination, nonwovens, repellent coatings, thermal burden

Procedia PDF Downloads 361
1295 Examining the Association of Demographic Factors and Arab Women’s Investment Behavior

Authors: Razan Salem

Abstract:

Men and women are different, and so their investment behaviors may also vary. To the author’s best knowledge, women's investment behavior and its association with demographic factors have not been explored directly in the behavioral finance literature, however, particularly in respect to the Arab region. Thus, this study extends the literature by focusing on examining the association of demographic factors (age, annual income, and education) with Arab women’s investment behavior. To achieve the study’s aim, the researcher distributed 600 close-ended online questionnaires to a sample of Arab male and female individual investors in both Saudi Arabia and Jordan; using Kruskal-Wallis H Test and the Mann-Whitney U Test to analyze the data. The findings reveal that age, education, and level of income are associated with Arab women’s investment behavior. Educational level and level of income are positively associated with Arab women investment confidence level. On the contrary, age is negatively associated with Arab women financial risk tolerance. According to annual income, Arab women with lower incomes have lower confidence and investment literacy levels. Overall, the study concludes that age, income, and education are important demographic factors that must be considered when investigating the investment behavior of women in the Arab region.

Keywords: Arab region, demographic factors, investment behavior, women investors

Procedia PDF Downloads 161
1294 Low Energy Technology for Leachate Valorisation

Authors: Jesús M. Martín, Francisco Corona, Dolores Hidalgo

Abstract:

Landfills present long-term threats to soil, air, groundwater and surface water due to the formation of greenhouse gases (methane gas and carbon dioxide) and leachate from decomposing garbage. The composition of leachate differs from site to site and also within the landfill. The leachates alter with time (from weeks to years) since the landfilled waste is biologically highly active and their composition varies. Mainly, the composition of the leachate depends on factors such as characteristics of the waste, the moisture content, climatic conditions, degree of compaction and the age of the landfill. Therefore, the leachate composition cannot be generalized and the traditional treatment models should be adapted in each case. Although leachate composition is highly variable, what different leachates have in common is hazardous constituents and their potential eco-toxicological effects on human health and on terrestrial ecosystems. Since leachate has distinct compositions, each landfill or dumping site would represent a different type of risk on its environment. Nevertheless, leachates consist always of high organic concentration, conductivity, heavy metals and ammonia nitrogen. Leachate could affect the current and future quality of water bodies due to uncontrolled infiltrations. Therefore, control and treatment of leachate is one of the biggest issues in urban solid waste treatment plants and landfills design and management. This work presents a treatment model that will be carried out "in-situ" using a cost-effective novel technology that combines solar evaporation/condensation plus forward osmosis. The plant is powered by renewable energies (solar energy, biomass and residual heat), which will minimize the carbon footprint of the process. The final effluent quality is very high, allowing reuse (preferred) or discharge into watercourses. In the particular case of this work, the final effluents will be reused for cleaning and gardening purposes. A minority semi-solid residual stream is also generated in the process. Due to its special composition (rich in metals and inorganic elements), this stream will be valorized in ceramic industries to improve the final products characteristics.

Keywords: forward osmosis, landfills, leachate valorization, solar evaporation

Procedia PDF Downloads 202
1293 The Impact of Information and Communication Technologies on Teaching Performance at an Iranian University

Authors: Yusef Hedjazi, Saeedeh Nazari Nooghabi

Abstract:

New information and communication technologies (ICT) as one of the main needs of Faculty members in the process of teaching and learning has used in Irans higher education system since 2000.The main purpose of this study is to investigate the role of information and communication technologies (ICT) in teaching performance of Agricultural and Natural Resources Faculties at University of Tehran. The statistical population of the study consisted of all 250 faculties in Agriculture and Natural Resources Colleges and a questionnaire was used to collect data. The reliability of the questionnaire was confirmed by computing of Cronbachs Alpha coefficient at greater than .72. The study showed a significant relationship between agricultural Faculty members teaching performance and competency in using ICT. The results of the regression analysis also explained 51.7% of the variance, teaching performance. The six independent variables that accounted for the explained variance were experience in using educational websites or software, use of educational multimedia (e.g. film and CD, etc), making a presentation using PowerPoint, familiarity with online education websites, using News group to discuss on educational subjects with colleagues and students, and using Electronic communication (messengers) to solve studentsproblems.

Keywords: information and communication technologies, agricultural and natural resources, faculties, teaching performance

Procedia PDF Downloads 332
1292 The Road Ahead: Merging Human Cyber Security Expertise with Generative AI

Authors: Brennan Lodge

Abstract:

Amidst a complex regulatory landscape, Retrieval Augmented Generation (RAG) emerges as a transformative tool for Governance Risk and Compliance (GRC) officers. This paper details the application of RAG in synthesizing Large Language Models (LLMs) with external knowledge bases, offering GRC professionals an advanced means to adapt to rapid changes in compliance requirements. While the development for standalone LLM’s (Large Language Models) is exciting, such models do have their downsides. LLM’s cannot easily expand or revise their memory, and they can’t straightforwardly provide insight into their predictions, and may produce “hallucinations.” Leveraging a pre-trained seq2seq transformer and a dense vector index of domain-specific data, this approach integrates real-time data retrieval into the generative process, enabling gap analysis and the dynamic generation of compliance and risk management content. We delve into the mechanics of RAG, focusing on its dual structure that pairs parametric knowledge contained within the transformer model with non-parametric data extracted from an updatable corpus. This hybrid model enhances decision-making through context-rich insights, drawing from the most current and relevant information, thereby enabling GRC officers to maintain a proactive compliance stance. Our methodology aligns with the latest advances in neural network fine-tuning, providing a granular, token-level application of retrieved information to inform and generate compliance narratives. By employing RAG, we exhibit a scalable solution that can adapt to novel regulatory challenges and cybersecurity threats, offering GRC officers a robust, predictive tool that augments their expertise. The granular application of RAG’s dual structure not only improves compliance and risk management protocols but also informs the development of compliance narratives with pinpoint accuracy. It underscores AI’s emerging role in strategic risk mitigation and proactive policy formation, positioning GRC officers to anticipate and navigate the complexities of regulatory evolution confidently.

Keywords: cybersecurity, gen AI, retrieval augmented generation, cybersecurity defense strategies

Procedia PDF Downloads 94
1291 Do Women with Endometriosis Have Higher Perceived Stress Levels than Healthy Women?

Authors: Jodie Hughes

Abstract:

Endometriosis affects 1 in 10 individuals that were born female globally. Endometriosis incidence rates peak between 30-40 year of age, in young women and adolescents it is a rarely suspected and often ill-diagnosed. The average cost of endometriosis is €9,579 per woman. More than 75% of women have reported being absent from work due to endometriosis, with 40% of women becoming unemployed due to the disease. 46% of patients with endometriosis need to have appointments with upward of five doctors to gain a correct diagnosis. Quantitative data were collected by way of an online PSS-10 survey that included demographic questions from two sample groups of females, group 1 was females with endometriosis, group 2 were healthy women. The data were scored using Cohens scoring system, overall scores were input to SPSS. A non-parametric Mann-Whitney U test and ANOVA was used to ascertain any differences between the PSS-10 scores of the two groups. A significance level of P<0.05 was adopted. Four women were invited to take part in a semi structured interview that was recorded, transcribed and coded using interpretive phenomenological analysis (IPA) using NVivo 12. Results showed that the PSS-10 scores were significantly higher in women with endometriosis compared to healthy women with a p=<0.005. Endometriosis affects all aspects of a patient’s life, to adequately diagnose and treat the condition and improve HRQoL there needs to be better understanding of the clinical symptoms and how they impact the lives of patients.

Keywords: endometriosis, HRQoL, perceived stress, women

Procedia PDF Downloads 134
1290 Regulatory Measures on Effective Nuclear Security and Safeguards System in Nigeria

Authors: Nnodi Chinweikpe Akelachi, Adebayo Oladini Kachollom Ifeoma

Abstract:

Insecurity and the possession of nuclear weapons for non-peaceful purposes constitute a major threat to global peace and security, and this undermines the capacity for sustainable development. In Nigeria, the threat of terrorism is a challenge to national stability. For over a decade, Nigeria has been faced with insecurity ranging from Boko-Haram terrorist groups, kidnapping and banditry. The threat exhibited by this non-state actor poses a huge challenge to nuclear and radiological high risks facilities in Nigeria. This challenge has resulted in the regulatory authority and International stakeholders formulating policies for a good mitigation strategy. This strategy is enshrined in formulated laws, regulations and guides like the repealed Nuclear Safety and Radiation Protection Act 19 of 1995 (Nuclear safety, Physical Security and Safeguards Bill), the Nigerian Physical Protection of Nuclear Material and Nuclear Facilities, and Nigerian Nuclear Safeguards Regulations of 2021. All this will help Nigeria’s effort to meet its national nuclear security and safeguards obligations. To further enhance the implementation of nuclear security and safeguards system, Nigeria has signed the Non-Proliferation Treaty (NPT) in 1970, the Comprehensive Safeguards Agreement (INFCIRC/358) in 1988, Additional Protocol in 2007 as well as the Convention on Physical Protection of Nuclear Material and its amendment in 2005. In view of the evolving threats by non-state actors in Nigeria, physical protection security upgrades are being implemented in nuclear and all high-risk radiological facilities through the support of the United States Department of Energy (US-DOE). Also, the IAEA has helped strengthen nuclear security and safeguard systems through the provision of technical assistance and capacity development. Efforts are being made to address some of the challenges identified in the cause of implementing the measures for effective nuclear security and safeguards systems in Nigeria. However, there are eminent challenges in the implementation of the measures within the security and systems in Nigeria. These challenges need to be addressed for an effective security and safeguard regime in Nigeria. This paper seeks to address the challenges encountered in implementing the regulatory and stakeholder measures for effective security and safeguards regime in Nigeria, amongst others.

Keywords: nuclear regulatory body, nuclear facilities and activities, international stakeholders, security and safeguards measures

Procedia PDF Downloads 109
1289 Bicycle Tourism and Sharing Economy (C2C-Tourism): Analysis of the Reciprocity Behavior in the Case of Warmshowers

Authors: Jana Heimel, Franziska Drescher, Lauren Ugur, Graciela Kuchle

Abstract:

Sharing platforms are a widely investigated field. However, there is a research gap with a lack of focus on ‘real’ (non-profit-orientated) sharing platforms. The research project addresses this gap by conducting an empirical study on a private peer-to-peer (P2P) network to investigate cooperative behavior from a socio-psychological perspective. In recent years the conversion from possession to accessing is increasingly influencing different sectors, particularly the traveling industry. The number of people participating in hospitality exchange platforms like Airbnb, Couchsurfing, and Warmshowers (WS) is rapidly growing. WS is an increasingly popular online community that is linking cycling tourists and locals. It builds on the idea of the “sharing economy” as a not-for-profit hospitality network for bicycle tourists. Hosts not only provide a sleeping berth and warm shower free of charge but also offer additional services to their guests, such as cooking and washing clothes for them. According to previous studies, they are motivated by the idea of promoting cultural experience and forming new friendships. Trust and reciprocity are supposed to play major roles in the success of such platforms. The objective of this research project is to analyze the reciprocity behavior within the WS community. Reciprocity is the act of giving and taking among each other. Individuals feel obligated to return a favor and often expect to increase their own chances of receiving future benefits for themselves. Consequently, the drivers that incite giving and taking, as well as the motivation for hosts and guests, are examined. Thus, the project investigates a particular tourism offer that contributes to sustainable tourism by analyzing P2P resp. cyclist-to-cyclist, C2C) tourism. C2C tourism is characterized by special hospitality and generosity. To find out what motivations drive the hosts and which determinants drive the sharing cycling economy, an empirical study has been conducted globally through an online survey. The data was gathered through the WS community and comprised responses from more than 10,000 cyclists around the globe. Next to general information mostly comprising quantitative data on bicycle tourism (year/tour distance, duration and budget), qualitative information on traveling with WS as well as hosting was collected. The most important motivations for a traveler is to explore the local culture, to save money, and to make friends. The main reasons to host a guest are to promote the use of bicycles and to make friends, but also to give back and pay forward. WS members prefer to stay with/host cyclists. The results indicate that C2C tourists share homogenous characteristics and a similar philosophy, which is crucial for building mutual trust. Members of WS are generally extremely trustful. The study promotes an ecological form of tourism by combining sustainability, regionality, health, experience and the local communities' cultures. The empirical evidence found and analyzed, despite evident limitations, enabled us to shed light, especially on the issue of motivations and social capital, and on the functioning of ‘sharing’ platforms. Final research results are intended to promote C2C tourism around the globe to further replace conventional by sustainable tourism.

Keywords: bicycle tourism, homogeneity, reciprocity, sharing economy, trust

Procedia PDF Downloads 116