Search results for: personal authentication
2280 Exposure Assessment to Airborne Particulate Matter in Agriculture
Authors: K. Rumchev, S. Gilbey
Abstract:
Airborne particulate matter is a known hazard to human health, with a considerable body of evidence linking agricultural dust exposures to adverse human health effects in exposed populations. It is also known that agricultural workers are exposed to high levels of soil dust and other types of airborne particulate matter within the farming environment. The aim of this study was to examine exposure to agricultural dust among farm workers during the seeding season. Twenty-one wheat-belt farms consented to participate in the study with 30 workers being monitored for dust exposure whilst seeding or undertaking seeding associated tasks. Each farm was visited once and farmers’ were asked to wear a personal air sampler for a 4-hour sampling period. Simultaneous, real-time, tractor cabin air quality monitoring was also undertaken. Data for this study was collected using real-time aerosol dust monitors to determine in-tractor cabin PM exposure to five size fractions (total, PM10, respirable, PM2.5 and PM1), and personal sampling was undertaken to establish individual exposure to inhalable and respirable dust concentrations. The study established a significant difference between personal exposures and simultaneous real-time in-cabin exposures for both inhalable and respirable fractions. No significant difference was shown between in-cabin and personal inhalable dust concentrations during seeding and spraying tasks, although both in-cabin and personal concentrations were two times greater for seeding than spraying. Future research should focus on educating and providing farm owners and workers with more information on adopting safe work practices to minimise harmful exposures to agricultural dust.Keywords: agriculture, air quality, Australia, particulate matter
Procedia PDF Downloads 2162279 Readiness of Iran’s Insurance Industry Salesforce to Accept Changing to Become Islamic Personal Financial Planners
Authors: Pedram Saadati, Zahra Nazari
Abstract:
Today, the role and importance of financial technology businesses in Iran have increased significantly. Although, in Iran, there is no Islamic or non-Islamic personal financial planning field of study in the universities or educational centers, the profession of personal financial planning is not defined, and there is no software introduced in this regard for advisors or consumers. The largest sales network of financial services in Iran belongs to the insurance industry, and there is an untapped market for international companies in Iran that can contribute to 130 thousand representatives in the insurance industry and 28 million families by providing training and personal financial advisory software. To the best of the author's knowledge, despite the lack of previous internal studies in this field, the present study investigates the level of readiness of the salesforce of the insurance industry to accept this career and its technology. The statistical population of the research is made up of managers, insurance sales representatives, assistants and heads of sales departments of insurance companies. An 18-minute video was prepared that introduced and taught the job of Islamic personal financial planning and explained its difference from its non-Islamic model. This video was provided to the respondents. The data collection tool was a research-made questionnaire. To investigate the factors affecting technology acceptance and job change, independent T descriptive statistics and Pearson correlation were used, and Friedman's test was used to rank the effective factors. The results indicate the mental perception and very positive attitude of the insurance industry activists towards the usefulness of this job and its technology, and the studied sample confirmed the intention of training in this knowledge. Based on research results, the change in the customer's attitude towards the insurance advisor and the possibility of increasing income are considered as the reasons for accepting. However, Restrictions on using investment opportunities due to Islamic financial services laws and the uncertainty of the position of the central insurance in this regard are considered as the most important obstacles.Keywords: fintech, insurance, personal financial planning, wealth management
Procedia PDF Downloads 492278 Impact of Brand Origin on Brand Loyalty: A Case of Personal Care Products in Pakistan
Authors: Aimen Batool Bint-E-Rashid, Syed Muhammad Dawood Ali Shah, Muhammad Usman Farooq, Mahgul Anwar
Abstract:
As the world is progressing, the needs and demands of the consumer market are also changing. Nowadays the trends of consumer purchase decisions are dependent upon multiple factors. This study aims to identify the influential impact of country of origin over the perception and devotion towards daily personal care products specifically in reference to the knowledge and awareness regarding that particular brand in Pakistan. To corroborate this study, a 30-item brand origin questionnaire has been used with 300 purchase decision makers belonging to different age groups. To illustrate this study, a model has been developed based on brand origin, brand awareness and brand loyalty. Correlation and regression analysis have been used to find out the results which conclude the findings on the perspective of Pakistan’s consumer market as that brand origin has a direct relationship with brand loyalty provided that the consumer has a positive brand awareness. Support for the fact that brand origin impacts brand loyalty through brand awareness has been presented in this study.Keywords: brand awareness, brand loyalty, brand origin, personal care products, P&G, Unilever
Procedia PDF Downloads 2412277 The Importance of the Historical Approach in the Linguistic Research
Authors: Zoran Spasovski
Abstract:
The paper shortly discusses the significance and the benefits of the historical approach in the research of languages by presenting examples of it in the fields of phonetics and phonology, lexicology, morphology, syntax, and even in the onomastics (toponomy and anthroponomy). The examples from the field of phonetics/phonology include insights into animal speech and its evolution into human speech, the evolution of the sounds of human speech from vocals to glides and consonants and from velar consonants to palatal, etc., on well-known examples of former researchers. Those from the field of lexicology show shortly the formation of the lexemes and their evolution; the morphology and syntax are explained by examples of the development of grammar and syntax forms, and the importance of the historical approach in the research of place-names and personal names is briefly outlined through examples of place-names and personal names and surnames, and the conclusions that come from it, in different languages.Keywords: animal speech, glotogenesis, grammar forms, lexicology, place-names, personal names, surnames, syntax categories
Procedia PDF Downloads 832276 Mental Health Literacy in Ghana: Consequences of Religiosity, Education, and Stigmatization
Authors: Peter Adu
Abstract:
Although research on the concept of Mental Health Literacy (MHL) is growing internationally, to the authors’ best of knowledge, the beliefs and knowledge of Ghanaians on specific mental disorders have not yet been explored. This vignette study was conducted to explore the relationships between religiosity, education, stigmatization, and MHL among Ghanaians using a sample of laypeople (N = 409). The adapted questionnaire presented two vignettes (depression and schizophrenia) about a hypothetical person. The results revealed that more participants were able to recognize depression (47.4%) than schizophrenia (15.9%). Religiosity was not significantly associated with recognition of mental disorders (MHL) but was positively related with both social and personal stigma for depression and negatively associated with personal and perceived stigma for schizophrenia. Moreover, education was found to relate positively with MHL and negatively with perceived stigma. Finally, perceived stigma was positively associated with MHL, whereas personal stigma for schizophrenia related negatively to MHL. In conclusion, education but not religiosity predicted identification accuracy, but both predictors were associated with various forms of stigma. Findings from this study have implications for MHL and anti-stigma campaigns in Ghana and other developing countries in the region.Keywords: depression, education, mental health literacy, religiosity, schizophrenia
Procedia PDF Downloads 1572275 Efficiency of PCR-RFLP for the Identification of Adulteries in Meat Formulation
Authors: Hela Gargouri, Nizar Moalla, Hassen Hadj Kacem
Abstract:
Meat adulteration affecting the safety and quality of food is becoming one of the main concerns of public interest across the world. The drastic consequences on the meat industry highlighted the urgent necessity to control the products' quality and to point out the complexity of both supply and processing circuits. Due to the expansion of this problem, the authentic testing of foods, particularly meat and its products, is deemed crucial to avoid unfair market competition and to protect consumers from fraudulent practices of meat adulteration. The adoption of authentication methods by the food quality-control laboratories is becoming a priority issue. However, in some developing countries, the number of food tests is still insignificant, although a variety of processed and traditional meat products are widely consumed. Little attention has been paid to provide an easy, fast, reproducible, and low-cost molecular test, which could be conducted in a basic laboratory. In the current study, the 359 bp fragment of the cytochrome-b gene was mapped by PCR-RFLP using firstly fresh biological supports (DNA and meat) and then turkey salami as an example of commercial processed meat. This technique has been established through several optimizations, namely: the selection of restriction enzymes. The digestion with BsmAI, SspI, and TaaI succeed to identify the seven included animal species when meat is formed by individual species and when the meat is a mixture of different origin. In this study, the PCR-RFLP technique using universal primer succeed to meet our needs by providing an indirect sequencing method identifying by restriction enzymes the specificities characterizing different species on the same amplicon reducing the number of potential tests.Keywords: adulteration, animal species, authentication, meat, mtDNA, PCR-RFLP
Procedia PDF Downloads 1122274 Social Anxiety Connection with Individual Characteristics: Theory of Mind, Verbal Irony Comprehension and Personal Traits
Authors: Anano Tenieshvili, Teona Lodia
Abstract:
Social anxiety disorder (SAD) is one of the most common mental health problems not only in adults but also in adolescents. Individuals with SAD exhibit difficulties in interpersonal relationships, understanding emotions, and regulating them as well. For social and emotional adaptation, it is crucial to identify, understand, accept and manage emotions correctly. Researchers actively learn those factors that contribute to the development and maintenance of this condition. Therefore, the main purpose of this study is to acquire knowledge about the association between social anxiety and individual characteristics, such as theory of mind (ToM), verbal irony comprehension, and personal traits. 112 adolescents aged from 12 to 18 were selected for this research. 15 of them are diagnosed with Social anxiety disorder. Statistical analysis was performed on the entire sample, and furthermore, two groups, adolescents with and without social anxiety disorder, were compared separately. Social anxiety and personal traits were assessed by questionnaires. Theory of mind and comprehension of verbal irony were measured using tests. Statistical analysis indicated a positive relationship between social anxiety and comprehension of ironic criticism. Moreover, social anxiety was significantly positively correlated with neuroticism and isolation tendency, whereas it was negatively related to extraversion and frustration tolerance. On top of that, statistical analysis revealed a positive relationship between ToM and verbal irony comprehension. However, the relationship between social anxiety and ToM was not statistically significant. In conclusion, the current research expands knowledge about social anxiety and supports the results of some previous studies.Keywords: personal traits, social anxiety, theory of mind, verbal irony comprehension
Procedia PDF Downloads 2012273 Social Anxiety Connection with Individual Characteristics: Theory of Mind, Verbal Irony Comprehension and Personal Traits
Authors: Anano Tenieshvili, Teona Lodia
Abstract:
Social anxiety disorder (SAD) is one of the most common mental health problems not only in adults but also in adolescents. Individuals with SAD exhibit difficulties in interpersonal relationships, understanding emotions and regulating them as well. For social and emotional adaptation, it is crucial to identify, understand, accept and manage emotions correctly. Researchers actively learn those factors that contribute to the development and maintenance of this condition. Therefore, the main purpose of this study is to acquire knowledge about the association between social anxiety and individual characteristics, such as the theory of mind (ToM), verbal irony comprehension and personal traits. 112 adolescents aged from 12 to 18 were selected for this research. 15 of them are diagnosed with Social anxiety disorder. Statistical analysis was performed on the entire sample and furthermore, two groups, adolescents with and without a social anxiety disorder, were compared separately. Social anxiety and personal traits were assessed by questionnaires. Theory of mind and comprehension of verbal irony was measured using tests. Statistical analysis indicated a positive relationship between social anxiety and comprehension of ironic criticism. Moreover, social anxiety was significantly positively correlated with neuroticism and isolation tendency, whereas it was negatively related to extraversion and frustration tolerance. On top of that, statistical analysis revealed a positive relationship between ToM and verbal irony comprehension. However, the relationship between social anxiety and ToM was not statistically significant. In conclusion, the current research expands knowledge about social anxiety and supports the results of some previous studies.Keywords: personal traits, social anxiety, theory of mind, verbal irony comprehension
Procedia PDF Downloads 1222272 Gender Differences in the Prediction of Smartphone Use While Driving: Personal and Social Factors
Abstract:
This study examines gender as a boundary condition for the relationship between the psychological variable of mindfulness and the social variable of income with regards to the use of smartphones by young drivers. The use of smartphones while driving increases the likelihood of a car accident, endangering young drivers and other road users. The study sample included 186 young drivers who were legally permitted to drive without supervision. The subjects were first asked to complete questionnaires on mindfulness and income. Next, their smartphone use while driving was monitored over a one-month period. This study is unique as it used an objective smartphone monitoring application (rather than self-reporting) to count the number of times the young participants actually touched their smartphones while driving. The findings show that gender moderates the effects of social and personal factors (i.e., income and mindfulness) on the use of smartphones while driving. The pattern of moderation was similar for both social and personal factors. For men, mindfulness and income are negatively associated with the use of smartphones while driving. These factors are not related to the use of smartphones by women drivers. Mindfulness and income can be used to identify male populations that are at risk of using smartphones while driving. Interventions that improve mindfulness can be used to reduce the use of smartphones by male drivers.Keywords: mindfulness, using smartphones while driving, income, gender, young drivers
Procedia PDF Downloads 1702271 Metaverse in Future Personal Healthcare Industry: From Telemedicine to Telepresence
Authors: Mohammed Saeed Jawad
Abstract:
Metaverse involves the convergence of three major technologies trends of AI, VR, and AR. Together these three technologies can provide an entirely new channel for delivering healthcare with great potential to lower costs and improve patient outcomes on a larger scale. Telepresence is the technology that allows people to be together even if they are physically apart. Medical doctors can be symbolic as interactive avatars developed to have smart conversations and medical recommendations for patients at the different stages of the treatment. Medical digital assets such as Medical IoT for real-time remote healthcare monitoring as well as the symbolic doctors’ avatars as well as the hospital and clinical physical constructions and layout can be immersed in extended realities 3D metaverse environments where doctors, nurses, and patients can interact and socialized with the related digital assets that facilitate the data analytics of the sensed and collected personal medical data with visualized interaction of the digital twin of the patient’s body as well as the medical doctors' smart conversation and consultation or even in a guided remote-surgery operation.Keywords: personal healthcare, metaverse, telemedicine, telepresence, avatar, medical consultation, remote-surgery
Procedia PDF Downloads 1352270 Personal Factors and Career Adaptability in a Call Centre Work Environment: The Mediating Effects of Professional Efficacy
Authors: Nisha Harry
Abstract:
The study discussed in this article sought to assess whether a sense of professional efficacy mediates the relationship between personal factors and career adaptability. A quantitative cross-sectional survey approach was followed. A non–probability sample of (N = 409) of which predominantly early career and permanently employed black females in call centres in Africa participated in this study. In order to assess personal factors, the participants completed sense of meaningfulness and emotional intelligence measures. Measures of professional efficacy and career adaptability were also completed. The results of the mediational analysis revealed that professional efficacy significantly mediates the meaningfulness (sense of coherence) and career adaptability relationship, but not the emotional intelligence–career adaptability relationship. Call centre agents with professional efficacy are likely to be more work engaged as a result of their sense of meaningfulness and emotional intelligence.Keywords: call centre, professional efficacy, career adaptability, emotional intelligence
Procedia PDF Downloads 3582269 Cybersecurity Challenges in the Era of Open Banking
Authors: Krish Batra
Abstract:
The advent of open banking has revolutionized the financial services industry by fostering innovation, enhancing customer experience, and promoting competition. However, this paradigm shift towards more open and interconnected banking ecosystems has introduced complex cybersecurity challenges. This research paper delves into the multifaceted cybersecurity landscape of open banking, highlighting the vulnerabilities and threats inherent in sharing financial data across a network of banks and third-party providers. Through a detailed analysis of recent data breaches, phishing attacks, and other cyber incidents, the paper assesses the current state of cybersecurity within the open banking framework. It examines the effectiveness of existing security measures, such as encryption, API security protocols, and authentication mechanisms, in protecting sensitive financial information. Furthermore, the paper explores the regulatory response to these challenges, including the implementation of standards such as PSD2 in Europe and similar initiatives globally. By identifying gaps in current cybersecurity practices, the research aims to propose a set of robust, forward-looking strategies that can enhance the security and resilience of open banking systems. This includes recommendations for banks, third-party providers, regulators, and consumers on how to mitigate risks and ensure a secure open banking environment. The ultimate goal is to provide stakeholders with a comprehensive understanding of the cybersecurity implications of open banking and to outline actionable steps for safeguarding the financial ecosystem in an increasingly interconnected world.Keywords: open banking, financial services industry, cybersecurity challenges, data breaches, phishing attacks, encryption, API security protocols, authentication mechanisms, regulatory response, PSD2, cybersecurity practices
Procedia PDF Downloads 602268 Biosignal Recognition for Personal Identification
Authors: Hadri Hussain, M.Nasir Ibrahim, Chee-Ming Ting, Mariani Idroas, Fuad Numan, Alias Mohd Noor
Abstract:
A biometric security system has become an important application in client identification and verification system. A conventional biometric system is normally based on unimodal biometric that depends on either behavioural or physiological information for authentication purposes. The behavioural biometric depends on human body biometric signal (such as speech) and biosignal biometric (such as electrocardiogram (ECG) and phonocardiogram or heart sound (HS)). The speech signal is commonly used in a recognition system in biometric, while the ECG and the HS have been used to identify a person’s diseases uniquely related to its cluster. However, the conventional biometric system is liable to spoof attack that will affect the performance of the system. Therefore, a multimodal biometric security system is developed, which is based on biometric signal of ECG, HS, and speech. The biosignal data involved in the biometric system is initially segmented, with each segment Mel Frequency Cepstral Coefficients (MFCC) method is exploited for extracting the feature. The Hidden Markov Model (HMM) is used to model the client and to classify the unknown input with respect to the modal. The recognition system involved training and testing session that is known as client identification (CID). In this project, twenty clients are tested with the developed system. The best overall performance at 44 kHz was 93.92% for ECG and the worst overall performance was ECG at 88.47%. The results were compared to the best overall performance at 44 kHz for (20clients) to increment of clients, which was 90.00% for HS and the worst overall performance falls at ECG at 79.91%. It can be concluded that the difference multimodal biometric has a substantial effect on performance of the biometric system and with the increment of data, even with higher frequency sampling, the performance still decreased slightly as predicted.Keywords: electrocardiogram, phonocardiogram, hidden markov model, mel frequency cepstral coeffiecients, client identification
Procedia PDF Downloads 2802267 How Unpleasant Emotions, Morals and Normative Beliefs of Severity Relate to Cyberbullying Intentions
Authors: Paula C. Ferreira, Ana Margarida Veiga Simão, Nádia Pereira, Aristides Ferreira, Alexandra Marques Pinto, Alexandra Barros, Vitor Martinho
Abstract:
Cyberbullying is a phenomenon of worldwide concern regarding children and adolescents’ mental health and risk behavior. Bystanders of this phenomenon can help diminish the incidence of this phenomenon if they engage in pro-social behavior. However, different social-cognitive and affective bystander reactions may surface because of the lack of contextual information and emotional cues in cyberbullying situations. Hence, this study investigated how cyberbullying bystanders’ unpleasant emotions could be related to their personal moral beliefs and their behavioral intentions to cyberbully or defend the victim. It also proposed to investigate how their normative beliefs of perceived severity about cyberbullying behavior could be related to their personal moral beliefs and their behavioral intentions. Three groups of adolescents participated in this study, namely a first of group 402 students (5th – 12th graders; Mage = 13.12; SD = 2.19; 55.7% girls) to compute explorative factorial analyses of the instruments used; a second group of 676 students (5th – 12th graders; Mage = 14.10; SD = 2.74; 55.5% were boys) to run confirmatory factor analyses; and a third group (N = 397; 5th – 12th graders; Mage = 13.88 years; SD = 1.45; 55.5% girls) to perform the main analyses to test the research hypotheses. Self-report measures were used, such as the Personal moral beliefs about cyberbullying behavior questionnaire, the Normative beliefs of perceived severity about cyberbullying behavior questionnaire, the Unpleasant emotions about cyberbullying incidents questionnaires, and the Bystanders’ behavioral intentions in cyberbullying situations questionnaires. Path analysis results revealed that unpleasant emotions were mediators of the relationship between adolescent cyberbullying bystanders’ personal moral beliefs and their intentions to help the victims in cyberbullying situations. Moreover, adolescent cyberbullying bystanders’ normative beliefs of gravity were mediators of the relationship between their personal moral beliefs and their intentions to cyberbully others. These findings provide insights for the development of prevention and intervention programs that promote social and emotional learning strategies as a means to prevent and intervene in cyberbullying.Keywords: cyberbullying, normative beliefs of perceived severity, personal moral beliefs, unpleasant emotions
Procedia PDF Downloads 2162266 Factors Influencing Walking in Bandar Baru Bangi, Malaysia
Authors: Zeinab Aliyas
Abstract:
Walking is known as the most common type of physical activity that helps mental and physical health of people. In the recent years, promoting walking activity in neighborhood areas and cities become as one of the important issues in terms of sustainable cities. Therefore the study aimed to investigate the influence of fear of crime and personal barriers as social and personal factor respectively on neighborhood walking. 464 questionnaires in Bandar Baru Bangi in Malaysia was distributed to collect data, and finally, 424 questionnaires were qualified to be used in the study. The Smart-PLS was used to analyze the data. The findings of the study revealed that individual barriers and fear of crime both have significant influence on the level of walking behavior in the neighborhood area. It was found that fear of crime has higher influence on walking behavior in comparison to individual factors. The finding of this study can help urban researcher and planner to know the significant influence of crime safety and individual attitudes on the level of walking activity.Keywords: fear of crime, neighborhood walking, personal barriers, residential neighborhood
Procedia PDF Downloads 1802265 Assessing Effectiveness of Manager-Subordinate Relationships at Workplace
Authors: Anant Sagar, Manisha Rana, Surabhi Singhal
Abstract:
This study was aimed at analysing the effectiveness of manager-subordinate relationship and the different factors contributing to its effectiveness in a mid-sized IT organization. To define effectiveness in context of a manager-subordinate relationship, a model was framed which analyses personal and professional need fulfilment of subordinates. On basis of this need satisfaction based effectiveness model, relationships are categorized into four types anchored on two scales; Personal Need Satisfaction and Professional Need Satisfaction. These spatial effectiveness scores of a managerial relationship are further mapped with the relationship style of the manager to identify relationship styles which are associated with different effectiveness levels. The relationship style is analysed by using Impact Message Inventory-Circumplex (IMI-C). The results show that managerial relationship’s effectiveness is contingent on manager’s affiliation scores, subordinate’s previous work experience and the ability of managers to influence the personal and professional needs of employees through organizational policies. The findings reflect that effectiveness of manager-subordinate relationship increased in a friendly workplace where managers were adequately empowered to acknowledge employee needs.Keywords: relationship effectiveness, need fulfilment, managerial style, impact message inventory-circumplex
Procedia PDF Downloads 3802264 The Security Trade-Offs in Resource Constrained Nodes for IoT Application
Authors: Sultan Alharby, Nick Harris, Alex Weddell, Jeff Reeve
Abstract:
The concept of the Internet of Things (IoT) has received much attention over the last five years. It is predicted that the IoT will influence every aspect of our lifestyles in the near future. Wireless Sensor Networks are one of the key enablers of the operation of IoTs, allowing data to be collected from the surrounding environment. However, due to limited resources, nature of deployment and unattended operation, a WSN is vulnerable to various types of attack. Security is paramount for reliable and safe communication between IoT embedded devices, but it does, however, come at a cost to resources. Nodes are usually equipped with small batteries, which makes energy conservation crucial to IoT devices. Nevertheless, security cost in terms of energy consumption has not been studied sufficiently. Previous research has used a security specification of 802.15.4 for IoT applications, but the energy cost of each security level and the impact on quality of services (QoS) parameters remain unknown. This research focuses on the cost of security at the IoT media access control (MAC) layer. It begins by studying the energy consumption of IEEE 802.15.4 security levels, which is followed by an evaluation for the impact of security on data latency and throughput, and then presents the impact of transmission power on security overhead, and finally shows the effects of security on memory footprint. The results show that security overhead in terms of energy consumption with a payload of 24 bytes fluctuates between 31.5% at minimum level over non-secure packets and 60.4% at the top security level of 802.15.4 security specification. Also, it shows that security cost has less impact at longer packet lengths, and more with smaller packet size. In addition, the results depicts a significant impact on data latency and throughput. Overall, maximum authentication length decreases throughput by almost 53%, and encryption and authentication together by almost 62%.Keywords: energy consumption, IEEE 802.15.4, IoT security, security cost evaluation
Procedia PDF Downloads 1682263 Academic Goal Setting Practices of University Students in Lagos State, Nigeria: Implications for Counselling
Authors: Asikhia Olubusayo Aduke
Abstract:
Students’ inability to set data-based (specific, measurable, attainable, reliable, and time-bound) personal improvement goals threatens their academic success. Hence, the study aimed to investigate year-one students’ academic goal-setting practices at Lagos State University of Education, Nigeria. Descriptive survey research was used in carrying out this study. The study population consisted of 3,101 year-one students of the University. A sample size of five hundred (501) participants was selected through a proportional and simple random sampling technique. The Formative Goal Setting Questionnaire (FGSQ) developed by Research Collaboration (2015) was adapted and used as an instrument for the study. Two main research questions were answered, while two null hypotheses were formulated and tested for the study. The study revealed higher data-based goals for all students than personal improvement goals. Nevertheless, data-based and personal improvement goal-setting for female students was higher than for male students. One sample test statistic and Anova used to analyse data for the two hypotheses also revealed that the mean difference between male and female year one students’ data-based and personal improvement goal-setting formation was statistically significant (p < 0.05). This means year one students’ data-based and personal improvement goals showed significant gender differences. Based on the findings of this study, it was recommended, among others, that therapeutic techniques that can help to change students’ faulty thinking and challenge their lack of desire for personal improvement should be sought to treat students who have problems with setting high personal improvement goals. Counsellors also need to advocate continued research into how to increase the goal-setting ability of male students and should focus more on counselling male students’ goal-setting ability. The main contributions of the study are higher institutions must prioritize early intervention in first-year students' academic goal setting. Researching gender differences in this practice reveals a crucial insight: male students often lag behind in setting meaningful goals, impacting their motivation and performance. Focusing on this demographic with data-driven personal improvement goals can be transformative. By promoting goal setting that is specific, measurable, and focused on self-growth (rather than competition), male students can unlock their full potential. Researchers and counselors play a vital role in detecting and supporting students with lower goal-setting tendencies. By prioritizing this intervention, we can empower all students to set ambitious, personalized goals that ignite their passion for learning and pave the way for academic success.Keywords: academic goal setting, counselling, practice, university, year one students
Procedia PDF Downloads 612262 Pivoting to Fortify our Digital Self: Revealing the Need for Personal Cyber Insurance
Authors: Richard McGregor, Carmen Reaiche, Stephen Boyle
Abstract:
Cyber threats are a relatively recent phenomenon and offer cyber insurers a dynamic and intelligent peril. As individuals en mass become increasingly digitally dependent, Personal Cyber Insurance (PCI) offers an attractive option to mitigate cyber risk at a personal level. This abstract proposes a literature review that conceptualises a framework for siting Personal Cyber Insurance (PCI) within the context of cyberspace. The lack of empirical research within this domain demonstrates an immediate need to define the scope of PCI to allow cyber insurers to understand personal cyber risk threats and vectors, customer awareness, capabilities, and their associated needs. Additionally, this will allow cyber insurers to conceptualise appropriate frameworks allowing effective management and distribution of PCI products and services within a landscape often in-congruent with risk attributes commonly associated with traditional personal line insurance products. Cyberspace has provided significant improvement to the quality of social connectivity and productivity during past decades and allowed enormous capability uplift of information sharing and communication between people and communities. Conversely, personal digital dependency furnish ample opportunities for adverse cyber events such as data breaches and cyber-attacksthus introducing a continuous and insidious threat of omnipresent cyber risk–particularly since the advent of the COVID-19 pandemic and wide-spread adoption of ‘work-from-home’ practices. Recognition of escalating inter-dependencies, vulnerabilities and inadequate personal cyber behaviours have prompted efforts by businesses and individuals alike to investigate strategies and tactics to mitigate cyber risk – of which cyber insurance is a viable, cost-effective option. It is argued that, ceteris parabus, the nature of cyberspace intrinsically provides characteristic peculiarities that pose significant and bespoke challenges to cyber insurers, often in-congruent with risk attributes commonly associated with traditional personal line insurance products. These challenges include (inter alia) a paucity of historical claim/loss data for underwriting and pricing purposes, interdependencies of cyber architecture promoting high correlation of cyber risk, difficulties in evaluating cyber risk, intangibility of risk assets (such as data, reputation), lack of standardisation across the industry, high and undetermined tail risks, and moral hazard among others. This study proposes a thematic overview of the literature deemed necessary to conceptualise the challenges to issuing personal cyber coverage. There is an evident absence of empirical research appertaining to PCI and the design of operational business models for this business domain, especially qualitative initiatives that (1) attempt to define the scope of the peril, (2) secure an understanding of the needs of both cyber insurer and customer, and (3) to identify elements pivotal to effective management and profitable distribution of PCI - leading to an argument proposed by the author that postulates that the traditional general insurance customer journey and business model are ill-suited for the lineaments of cyberspace. The findings of the review confirm significant gaps in contemporary research within the domain of personal cyber insurance.Keywords: cyberspace, personal cyber risk, personal cyber insurance, customer journey, business model
Procedia PDF Downloads 1032261 Using Printouts as Social Media Evidence and Its Authentication in the Courtroom
Authors: Chih-Ping Chang
Abstract:
Different from traditional objective evidence, social media evidence has its own characteristics with easily tampering, recoverability, and cannot be read without using other devices (such as a computer). Simply taking a screenshot from social network sites must be questioned its original identity. When the police search and seizure digital information, a common way they use is to directly print out digital data obtained and ask the signature of the parties at the presence, without taking original digital data back. In addition to the issue on its original identity, this conduct to obtain evidence may have another two results. First, it will easily allege that is tampering evidence because the police wanted to frame the suspect and falsified evidence. Second, it is not easy to discovery hidden information. The core evidence associated with crime may not appear in the contents of files. Through discovery the original file, data related to the file, such as the original producer, creation time, modification date, and even GPS location display can be revealed from hidden information. Therefore, how to show this kind of evidence in the courtroom will be arguably the most important task for ruling social media evidence. This article, first, will introduce forensic software, like EnCase, TCT, FTK, and analyze their function to prove the identity with another digital data. Then turning back to the court, the second part of this article will discuss legal standard for authentication of social media evidence and application of that forensic software in the courtroom. As the conclusion, this article will provide a rethinking, that is, what kind of authenticity is this rule of evidence chase for. Does legal system automatically operate the transcription of scientific knowledge? Or furthermore, it wants to better render justice, not only under scientific fact, but through multivariate debating.Keywords: federal rule of evidence, internet forensic, printouts as evidence, social media evidence, United States v. Vayner
Procedia PDF Downloads 2902260 Aitys as the Kazakh Traditional Music Genre in the Sense of Cognitive Musicology
Authors: Indira Makhazhan, Azamat Taigarayev, Perizat Yerlan, Batyrbay Gulbike, Samal Abzhanova
Abstract:
Aitys is a competitional performance of two or more poets creating instantly the lyrics of music concerning the social issues accompanied with the traditional instrument dombra. It is an unique music genre, because it is not practical to create music and lyrics spontaneous in anywhere else. This research study tends to approach to this particular music genre Aitys and identify its significance not only in the sense of the Kazakh cultural heritage, but also from the perspective of personal development as the improvisational , oratory, public performance skills within the ability to think critically over the social problems and represent them in convenient to public form. Through conducting this research, this paper aims to reveal the importance and beneficence of aitys in terms of both prevalence of cultural heritage and its function in personal development of the singer. In order to answer to the research question, we conducted a survey and an in-depth interview with the students of Nazarbayev University. In the survey it was asked to answer the general questions about aitys and its importance, whereas in the interview part, we asked their opinion on the importance of aitys in improving the personal skills. The results of findings was more surprising than it was expected. They agreed that the aitys lessons, workshops and concerts have high outcomes in terms improvements of improvisational, oratory, and leadership skills. Students of NU as a representors of young generation have shown a great interest in aitys, and even more interested in the topics/social issues, where the poets have to defend their usually controversial position. To conclude, the research study has focused on the importance of the aitys in personal development of different leadership skills. The given research lead us to think about the aitys as a part of cognitive musicology, where within the learning of music it represents the process of cognition as well.Keywords: aitys, cultural heritage, Kazakh language, musicology, personal development
Procedia PDF Downloads 3542259 Interactive Systems in B2B Marketing: Perceptions of Sales Configurator Use
Authors: Tommi Mahlamaki, Mika Ojala
Abstract:
Digitalization is changing our lives in many ways. As consumers, we are accustomed using different online interactive sales systems. However, while many online selling sites offer systems that have evolved from simple selling functions, the change has not been as rapid in business-to-business (B2B) markets. This is because many B2B companies rely on personal sales and personal communication. The main objective of this research is to clarify perceptions towards digital interactive sales systems and, more specifically, sales configurators. It also aims to identify trends towards the use of sales configurators. To reach these objectives, an online questionnaire was created that targets Finnish B2B distributors who are, by definition, part of B2B markets. The questionnaire was sent to 340 distributors, and it was returned by 150 respondents. The results showed that 82% of respondents had heard about sales configurators, and 64% had used them. The results also showed that 48% of respondents felt that the use of sales configurators would increase in the future, while only 2% felt they would be used less. The future use of sales configurators was not seen as affecting the level of personal sales. In light of the results, we recommend that B2B companies create marketing strategies that integrate and complement traditional sales processes with digital interactive systems.Keywords: digitalization, interactive systems, marketing, sales process
Procedia PDF Downloads 2462258 Canadian High School Students' Attitudes and Perspectives Towards People With Disabilities, Autism, and ADHD
Authors: Khodi Morgan, Kasey Crowe, Amanda Morgan
Abstract:
Canadian High School Students' Attitudes & Perspectives Towards People With Disabilities, Autism, and ADHD. Objective: To survey Canadian high school students' regarding their attitudes and perspectives towards people with disabilities and explore how age, gender, and personal experience with disability may impact these views. Methods A survey was developed using the standardized Attitude Toward Persons With Disability Scale as its base, with the addition of questions specifically about Autism and Attention Deficit Hyperactivity Disorder (ADHD). The survey also gathered information about the participants’ age and gender and whether or not they, or a close family member, had any disabilities. Participants were recruited at a public Canadian high school by fellow student researchers. Results A total of 219 (N=219) students ranging from 13 - 19 years old participated in the study (m= 15.9 years of age). Gender was equally split, with 44% male, 42% female and 14% undeclared. Experience with disability was common amongst participants, with 25% self-identifying as having a personal disability and 48% claiming to have a close family member with a disability. Exploratory trends indicated that females, and people with self-identified disabilities, and people with close family members with disabilities trended towards having more positive attitudes toward persons with disabilities. This poster will report upon these trends and explore in more depth how personal factors such as age, gender and personal disability status impact high school students attitudes toward persons with disability in general and in regards to Autism and ADHD specifically.Keywords: disability, autism, ADHD, community research, acceptance, adolescence, high school
Procedia PDF Downloads 742257 Personal Perception of the Acoustic Properties of Three Different Rooms for Music Lessons
Authors: Natalia Ivanova, Konstantin Adamov
Abstract:
The importance of acoustics in music classes made us analyse three music rooms in a Bulgarian school. The same music piece was performed in every one of the classrooms. The recording was played to 2 groups of students. A survey was then taken among those students in order to determine their personal preferences and impressions of the acoustic. The results show differences in the preferences of older students compared to younger ones. Results of the survey show a correlation between older students’ preferences and the standard requirements. However, we discover that younger students’ classrooms should be further analysed and adapted to their needs and preferences.Keywords: acousic, building acoustic, sound quality, scool acoustic
Procedia PDF Downloads 1042256 Non-Invasive Techniques of Analysis of Painting in Forensic Fields
Authors: Radka Sefcu, Vaclava Antuskova, Ivana Turkova
Abstract:
A growing market with modern artworks of a high price leads to the creation and selling of artwork counterfeits. Material analysis is an important part of the process of assessment of authenticity. Knowledge of materials and techniques used by original authors is also necessary. The contribution presents possibilities of non-invasive methods of structural analysis in research on paintings. It was proved that unambiguous identification of many art materials is feasible without sampling. The combination of Raman spectroscopy with FTIR-external reflection enabled the identification of pigments and binders on selected artworks of prominent Czech painters from the first half of the 20th century – Josef Čapek, Emil Filla, Václav Špála and Jan Zrzavý. Raman spectroscopy confirmed the presence of a wide range of white pigments - lead white, zinc white, titanium white, barium white and also Freeman's white as a special white pigment of painting. Good results were obtained for red, blue and most of the yellow areas. Identification of green pigments was often impossible due to strong fluorescence. Oil was confirmed as a binding medium on most of the analyzed artworks via FTIR - external reflection. Collected data present the valuable background for the determination of art materials characteristic for each painter (his palette) and its development over time. Obtained results will further serve as comparative material for the authentication of artworks. This work has been financially supported by the project of the Ministry of the Interior of the Czech Republic: The Development of a Strategic Cluster for Effective Instrumental Technological Methods of Forensic Authentication of Modern Artworks (VJ01010004).Keywords: non-invasive analysis, Raman spectroscopy, FTIR-external reflection, forgeries
Procedia PDF Downloads 1722255 Lightweight and Seamless Distributed Scheme for the Smart Home
Authors: Muhammad Mehran Arshad Khan, Chengliang Wang, Zou Minhui, Danyal Badar Soomro
Abstract:
Security of the smart home in terms of behavior activity pattern recognition is a totally dissimilar and unique issue as compared to the security issues of other scenarios. Sensor devices (low capacity and high capacity) interact and negotiate each other by detecting the daily behavior activity of individuals to execute common tasks. Once a device (e.g., surveillance camera, smart phone and light detection sensor etc.) is compromised, an adversary can then get access to a specific device and can damage daily behavior activity by altering the data and commands. In this scenario, a group of common instruction processes may get involved to generate deadlock. Therefore, an effective suitable security solution is required for smart home architecture. This paper proposes seamless distributed Scheme which fortifies low computational wireless devices for secure communication. Proposed scheme is based on lightweight key-session process to upheld cryptic-link for trajectory by recognizing of individual’s behavior activities pattern. Every device and service provider unit (low capacity sensors (LCS) and high capacity sensors (HCS)) uses an authentication token and originates a secure trajectory connection in network. Analysis of experiments is revealed that proposed scheme strengthens the devices against device seizure attack by recognizing daily behavior activities, minimum utilization memory space of LCS and avoids network from deadlock. Additionally, the results of a comparison with other schemes indicate that scheme manages efficiency in term of computation and communication.Keywords: authentication, key-session, security, wireless sensors
Procedia PDF Downloads 3172254 Authentication and Legal Admissibility of 'Computer Evidence from Electronic Voting Machines' in Electoral Litigation: A Qualitative Legal Analysis of Judicial Opinions of Appellate Courts in the USA
Authors: Felix O. Omosele
Abstract:
Several studies have established that electronic voting machines are prone to multi-faceted challenges. One of which is their capacity to lose votes after the ballots might have been cast. Therefore, the international consensus appears to favour the use of electronic voting machines that are accompanied with verifiable audit paper audit trail (VVPAT). At present, there is no known study that has evaluated the impacts (or otherwise) of this verification and auditing on the authentication, admissibility and evidential weight of electronically-obtained electoral data. This legal inquiry is important as elections are sometimes won or lost in courts and on the basis of such data. This gap will be filled by the present research work. Using the United States of America as a case study, this paper employed a qualitative legal analysis of several of its appellate courts’ judicial opinions. This analysis equally unearths the necessary statutory rules and regulations that are important to the research problem. The objective of the research is to highlight the roles played by VVPAT on electoral evidence- as seen from the eyes of the court. The preliminary outcome of this qualitative analysis shows that the admissibility and weight attached to ‘Computer Evidence from e-voting machines (CEEM)’ are often treated with general standards applied to other computer-stored evidence. These standards sometimes fail to embrace the peculiar challenges faced by CEEM, particularly with respect to their tabulation and transmission. This paper, therefore, argues that CEEM should be accorded unique consideration by courts. It proposes the development of a legal standard which recognises verification and auditing as ‘weight enhancers’ for electronically-obtained electoral data.Keywords: admissibility of computer evidence, electronic voting, qualitative legal analysis, voting machines in the USA
Procedia PDF Downloads 1962253 Meaning and Cultivating Factors of Mindfulness as Experienced by Thai Females Who Practice Dhamma
Authors: Sukjai Charoensuk, Penphan Pitaksongkram, Michael Christopher
Abstract:
Preliminary evidences supported the effectiveness of mindfulness-based interventions in reducing symptoms associated with a variety of medical and psychological conditions. However, the measurements of mindfulness are questionable since they have not been developed based-on Buddhist experiences. The purpose of this qualitative study was to describe meaning and cultivating factors of mindfulness as experienced by Thai females who practice Dhamma. Participants were purposively selected to include 2 groups of Thai females who practice Dhamma. The first group consisted of 6 female Buddhist monks, and the second group consisted of 7 female who practice Dhamma without ordaining. Data were collected using in-depth interview. The instruments used were demographic data questionnaire and guideline for in-depth interview developed by researchers. Content analysis was employed to analyze the data. The results revealed that Thai women who practice Dhamma described their experience in 2 themes, which were meaning and cultivating factors of mindfulness. The meaning composed of 4 categories; 1) Being Present, 2) Self-awareness, 3) Contemplation, and 4) Neutral. The cultivating factors of mindfulness composed of 2 categories; In-personal factors and Ex-personal factors. The In-personal cultivating factors included 4 sub-categories; Faith and Love, the Five Precepts, Sound body, and Practice. The Ex-personal cultivating factors included 2 sub-categories; Serenity, and Learning. These findings increase understanding about meaning of mindfulness and its cultivating factors. These could be used as a guideline to promote mental health and develop nursing interventions using mindfulness based, as well as, develop the instrument for assessing mindfulness in Thai context.Keywords: cultivating factor, meaning of mindfulness, practice Dhamma, Thai women
Procedia PDF Downloads 3512252 Students' Satisfaction towards the Counseling Services of the Faculty of Industrial Technology, Suan Sunandha Rajabhat University
Authors: Weera Chotithammaporn, Bannasorn Santhan
Abstract:
The purpose of this study was to investigate the students’ satisfaction towards the counseling services of the Faculty of Industrial Technology, Suan Sunandha Rajabhat University. The sample group consisted of 311 students coming for counseling services during September to October 2012 BE to complete the questionnaires developed by the researcher. The data were analyzed to find percentage, arithmetic mean, and SD, from which it can be concluded that: 1) Personal information including gender, GPA, department, year of the study, and hometown revealed that most of the students in the Faculty of Industrial Technology, Suan Sunandha Rajabhat University were female with the GPA between 2.01 and 2.50 and studied in the Department of Interior and Exhibition Design and Graphic and Multimedia Design. Most of them were in the first year of the study and came from the southern part of Thailand. 2) The level of students’ satisfaction towards the counseling services of the Faculty of Industrial Technology, Suan Sunandha Rajabhat University was in overall at high level with the highest aspect on IT services followed by follow-up and evaluation service, counseling service, individual personal data collecting service, and personal placement service respectively.Keywords: satisfaction, students, counseling service, Faculty of Industrial Technology
Procedia PDF Downloads 2812251 Body Image Dissatifaction with and Personal Behavioral Control in Obese Patients Who are Attending to Treatment
Authors: Mariela Gonzalez, Zoraide Lugli, Eleonora Vivas, Rosana Guzmán
Abstract:
The objective was to determine the predictive capacity of self-efficacy perceived for weight control, locus of weight control and skills of weight self-management in the dissatisfaction of the body image in obese people who attend treatment. Sectional study conducted in the city of Maracay, Venezuela, with 243 obese who attend to treatment, 173 of the feminine gender and 70 of the male, with ages ranging between 18 and 57 years old. The sample body mass index ranged between 29.39 and 44.14. The following instruments were used: The Body Shape Questionnaire (BSQ), the inventory of body weight self-regulation, The Inventory of self-efficacy in the regulation of body weight and the Inventory of the Locus of weight control. Calculating the descriptive statistics and of central tendency, coefficients of correlation and multiple regression; it was found that a low ‘perceived Self-efficacy in the weight control’ and a high ‘Locus of external control’, predict the dissatisfaction with body image in obese who attend treatment. The findings are a first approximation to give an account of the importance of the personal control variables in the study of the psychological grief on the overweight individual.Keywords: dissatisfaction with body image, obese people, personal control, psychological variables
Procedia PDF Downloads 432