Search results for: privacy of individuals
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3423

Search results for: privacy of individuals

3243 Addressing Security and Privacy Issues in a Smart Environment by Using Block-Chain as a Preemptive Technique

Authors: Shahbaz Pervez, Aljawharah Almuhana, Zahida Parveen, Samina Naz, Hira Tariq, Seyed Hosseini, Muhammad Awais Azam

Abstract:

With the latest development in the field of cutting-edge technologies, there is a rapid increase in the use of technology-oriented gadgets. In a recent scenario of the tech era, there is increasing demand to fulfill our day-to-day routine tasks with the help of technological gadgets. We are living in an era of technology where trends have been changing, and a race to introduce a new technology gadget has already begun. Smart cities are getting more popular with every passing day; city councils and governments are under enormous pressure to provide the latest services for their citizens and equip them with all the latest facilities. Thus, ultimately, they are going more into smart cities infrastructure building, providing services to their inhabitants with a single click from their smart devices. This trend is very exciting, but on the other hand, if some incident of security breach happens due to any weaker link, the results would be catastrophic. This paper addresses potential security and privacy breaches with a possible solution by using Blockchain technology in IoT enabled environment.

Keywords: blockchain, cybersecurity, DDOS, intrusion detection, IoT, RFID, smart devices security, smart services

Procedia PDF Downloads 87
3242 An Exploratory Study of Entrepreneurial Satisfaction among Older Founders

Authors: Catarina Seco Matos, Miguel Amaral

Abstract:

The developed world is facing falling birth rates and rising life expectancies. As a result, the overall demographic structure of societies is becoming markedly older. This leads to an economic and political pressure towards the extension of individuals’ working lives. On the other hand, evidence shows that some older workers choose to stay in the labour force as employees, whereas others choose to pursue a more entrepreneurial occupational path. Thus, entrepreneurship or self-employment may be an option for socioeconomic participation of older individuals. Previous research on senior entrepreneurship is scarce and it focuses mainly on entrepreneurship determinants and individuals’ intentions. The fact that entrepreneurship is perceived as a voluntary or involuntary decision or as a positive or a negative outcome by older individuals is, to the best of our knowledge, still unexplored in the literature. In order to analyse the determinants of entrepreneurial satisfaction among older individuals, primary data were obtained from a unique questionnaire survey, which was sent to Portuguese senior entrepreneurs who have launched their company aged 50 and over (N=181). Portugal is one of the countries in the world with the with the largest ageing population and with a high proportion of older individuals who remain active after their official retirement age – which makes it an extremely relevant case study on senior entrepreneurship. Findings suggest that non pecuniary factors (rather than pecuniary) are the main driver for entrepreneurship at older ages. Specifically, results show that the will to remain active is the main motivation of older individuals to become entrepreneurs. This is line with the activity and continuity theories. Furthermore, senior entrepreneurs tend to have had an active working life (using their professional experience as a proxy) and, thus, want to keep the same lifestyle at an older age (in line with theory of continuity). Finally, results show that even though older individuals’ companies may not show the best financial performance that does not seem to affect their satisfaction with the company and with entrepreneurship in general. The present study aims at exploring, discussing and bring new research on senior entrepreneurship to the fore, rather than assuming purely deductive approach; hence, further confirmatory analyses with larger sets from different countries of data are required.

Keywords: active ageing, entrepreneurship, older entrepreneur, Portugal, satisfaction, senior entrepreneur

Procedia PDF Downloads 212
3241 Decision Making, Reward Processing and Response Selection

Authors: Benmansour Nassima, Benmansour Souheyla

Abstract:

The appropriate integration of reward processing and decision making provided by the environment is vital for behavioural success and individuals’ well being in everyday life. Functional neurological investigation has already provided an inclusive image on affective and emotional (motivational) processing in the healthy human brain and has recently focused its interest also on the assessment of brain function in anxious and depressed individuals. This article offers an overview on the theoretical approaches that relate emotion and decision-making, and spotlights investigation with anxious or depressed individuals to reveal how emotions can interfere with decision-making. This research aims at incorporating the emotional structure based on response and stimulation with a Bayesian approach to decision-making in terms of probability and value processing. It seeks to show how studies of individuals with emotional dysfunctions bear out that alterations of decision-making can be considered in terms of altered probability and value subtraction. The utmost objective is to critically determine if the probabilistic representation of belief affords could be a critical approach to scrutinize alterations in probability and value representation in subjective with anxiety and depression, and draw round the general implications of this approach.

Keywords: decision-making, motivation, alteration, reward processing, response selection

Procedia PDF Downloads 446
3240 Imprecise Vowel Articulation in Down Syndrome: An Acoustic Study

Authors: Anitha Naittee Abraham, N. Sreedevi

Abstract:

Individuals with Down syndrome (DS) have relatively better expressive language compared to other individuals with intellectual disabilities. Reduced speech intelligibility is one of the major concerns of this group of individuals due to their anatomical and physiological differences. The study investigated the vowel articulation of Malayalam speaking children with DS in the age range of 5-10 years. The vowel production of 10 children with DS was compared with typically developing children in the same age range. Vowels were extracted from 3 words with the corner vowels /a/, /i/ and /u/ in the word-initial position, using Praat (version 5.3.23) software. Acoustic analysis was based on vowel space area (VSA), Formant centralization ration (FCR) and F2i/F2u. The findings revealed increased formant values for the control group except for F2a and F2u. Also, the experimental group had higher FCR, lower VSA, and F2i/F2u values suggestive of imprecise vowel articulation due to restricted tongue movements. The results of the independent t-test revealed a significant difference in F1a, F2i, F2u, VSA, FCR and F2i/F2u values between the experimental and control group. These findings support the fact that children with DS have imprecise vowel articulation that interferes with the overall speech intelligibility. Hence it is essential to target the oromotor skills to enhance the speech intelligibility which in turn benefit in the social and vocational domains of these individuals.

Keywords: Down syndrome, FCR, vowel articulation, vowel space

Procedia PDF Downloads 155
3239 Barriers to Yoga and Yoga-Based Therapy for Black and Brown Individuals in the United States: Implications for Social Work Practice

Authors: Jessica Gladden

Abstract:

Yoga has been accepted in the majority of communities in the United States as a method of assisting individuals with improving their physical health. Both community yoga classes and yoga-based therapy have been shown to be highly useful for individual’s mental health. Yoga-based therapy has been supported by research to be an evidence-based practice for individuals experiencing anxiety, depression, and disordered eating and for those experiencing post traumatic stress disorder in the wake of trauma. Many individuals who have experienced trauma, as well as other mental health diagnoses, are either very disconnected from their physical bodies or feel unsafe in their bodies. Yoga can be a method of creating safety and control in the body. This is recommended by some of the leading researchers in trauma therapy as a beginning step towards finding safety in the body in order to begin to work on the additional mental health challenges before addressing other long-term challenges. Unfortunately, yoga for physical and mental health is underutilized in black and brown communities despite the research regarding the benefits. Very few studies have examined the barriers to access to yoga for black, brown, and indigenous individuals. This study interviewed 15 yoga practitioners who identified as black or brown and explored the barriers they see in their communities related to accessing yoga and yoga-based services. Several of the themes reported include not feeling welcome, cost of services, time, and cultural/ religious components. Methods for reducing barriers will also be discussed.

Keywords: yoga, sport, barrier, black

Procedia PDF Downloads 57
3238 The Art and Science of Trauma-Informed Psychotherapy: Guidelines for Inter-Disciplinary Clinicians

Authors: Daphne Alroy-Thiberge

Abstract:

Trauma-impacted individuals present unique treatment challenges that include high reactivity, hyper-and hypo-arousal, poor adherence to therapy, as well as powerful transference and counter-transference experiences in therapy. This work provides an overview of the clinical tenets most often encountered in trauma-impacted individuals. Further, it provides readily applicable clinical techniques to optimize therapeutic rapport and facilitate accelerated positive mental health outcomes. Finally, integrated neuroscience and clinical evidence-based data are discussed to shed new light on crisis states in trauma-impacted individuals. This knowledge is utilized to provide effective and concrete interventions towards rapid and successful de-escalation of the impacted individual. A highly interactive, adult-learning-principles-based modality is utilized to provide an organic learning experience for participants. The information and techniques learned aim to increase clinical effectiveness, reduce staff injuries and burnout, and significantly enhance positive mental health outcomes and self-determination for the trauma-impacted individuals treated.

Keywords: clinical competencies, crisis interventions, psychotherapy techniques, trauma informed care

Procedia PDF Downloads 66
3237 Population Structure of Europian Pond Turtles, Emys Orbicularis (Linnaeus, 1758) in Narta Lagoon (Vlora Bay, Albania)

Authors: Enerit Saçdanaku, Idriz Haxhiu

Abstract:

In this study was monitored the population of the European Pond Turtle, Emys orbicularis (Linnaeus, 1758) in the area of Narta Lagoon, Vlora Bay (Albania), from August to October 2014. A total of 54 individuals of E. orbicularis were studied using different methodologies. Curved Carapace Length (CCL), Plastron Length (PL) and Curved Carapace Width (CCW) were measured for each individual of E. orbicularis and were statistically analyzed. All captured turtles were separated in seven different size–classes based on their carapace length (CCL). Each individual of E. orbicularis was marked by notching the carapace (marginal scutes). Form all individuals captured resulted that 37 were females (68.5%), 14 males (25.9%), 3 juveniles (5.5%), while 18 individuals of E. orbicularis were recaptured for the first and some for the second time.

Keywords: Emys orbicularis, female, juvenile, male, population, size–classes

Procedia PDF Downloads 179
3236 Psychological Alarm among Individuals Suffering from Irritable Bowel Syndrome

Authors: Selim A., Albasher N., Bakrmom G., Alanzi S.

Abstract:

Irritable bowel syndrome (IBS) is a chronic functional bowel disorder characterized by abdominal discomfort or pain and associated with alteration in frequency and/or form of bowel habit among other symptoms. This diagnosis is associated with increased levels of psychological distress, maladaptive coping, genetic risk factors, abnormal small and colonic intestine transit, change in stool frequency or form and abdominal discomfort or pain. Aim: The aim of the study was to assess psychological alarm among individuals suffering from Irritable Bowel Syndrome (IBS). Methods: A cross-sectional correlational research design was used to conduct the current study. A convenience sample of 504 participants was included in the present study. Data were collected using a self-report questionnaire. The questionnaire included socio-demographic data, ROME III to identify Irritable Bowel Syndrome (IBS) and Psychological Alarm Questionnaire. Results: Out of 504 participants who reported abdominal discomfort, 297 (58.9 %) participants met the diagnostic criteria of IBS. The mean age of the IBS participants was 30.16 years, females composed 75.1% of the IBS participants, and 55.2% did not seek medical help. Psychological alarms such as feeling anxious, feeling depressed, having suicidal ideations, bodily pain, having impaired functioning due to pain and feeling unable to cope with pain were significantly high among IBS individuals when compared to individuals not suffering from IBS. Psychological alarms such as feeling anxious, feeling depressed, having suicidal ideations, bodily pain, having impaired functioning due to pain and feeling unable to cope with pain were significantly high among IBS individuals compared to individuals not suffering from IBS. Conclusion: IBS is highly associated with significant psychological alarms including depression, anxiety and suicidal ideas.

Keywords: abdominal pain , irritable bowel syndrome, distress, psychological alarms

Procedia PDF Downloads 163
3235 Human Leukocyte Antigen Class 1 Phenotype Distribution and Analysis in Persons from Central Uganda with Active Tuberculosis and Latent Mycobacterium tuberculosis Infection

Authors: Helen K. Buteme, Rebecca Axelsson-Robertson, Moses L. Joloba, Henry W. Boom, Gunilla Kallenius, Markus Maeurer

Abstract:

Background: The Ugandan population is heavily affected by infectious diseases and Human leukocyte antigen (HLA) diversity plays a crucial role in the host-pathogen interaction and affects the rates of disease acquisition and outcome. The identification of HLA class 1 alleles and determining which alleles are associated with tuberculosis (TB) outcomes would help in screening individuals in TB endemic areas for susceptibility to TB and to predict resistance or progression to TB which would inevitably lead to better clinical management of TB. Aims: To be able to determine the HLA class 1 phenotype distribution in a Ugandan TB cohort and to establish the relationship between these phenotypes and active and latent TB. Methods: Blood samples were drawn from 32 HIV negative individuals with active TB and 45 HIV negative individuals with latent MTB infection. DNA was extracted from the blood samples and the DNA samples HLA typed by the polymerase chain reaction-sequence specific primer method. The allelic frequencies were determined by direct count. Results: HLA-A*02, A*01, A*74, A*30, B*15, B*58, C*07, C*03 and C*04 were the dominant phenotypes in this Ugandan cohort. There were differences in the distribution of HLA types between the individuals with active TB and the individuals with LTBI with only HLA-A*03 allele showing a statistically significant difference (p=0.0136). However, after FDR computation the corresponding q-value is above the expected proportion of false discoveries (q-value 0.2176). Key findings: We identified a number of HLA class I alleles in a population from Central Uganda which will enable us to carry out a functional characterization of CD8+ T-cell mediated immune responses to MTB. Our results also suggest that there may be a positive association between the HLA-A*03 allele and TB implying that individuals with the HLA-A*03 allele are at a higher risk of developing active TB.

Keywords: HLA, phenotype, tuberculosis, Uganda

Procedia PDF Downloads 381
3234 Examples of Techniques and Algorithms Used in Wlan Security

Authors: Vahid Bairami Rad

Abstract:

Wireless communications offer organizations and users many benefits such as portability and flexibility, increased productivity, and lower installation costs. Wireless networks serve as the transport mechanism between devices and among devices and the traditional wired networks (enterprise networks and the internet). Wireless networks are many and diverse but are frequently categorized into three groups based on their coverage range: WWAN, WLAN, and WPAN. WWAN, representing wireless wide area networks, includes wide coverage area technologies such as 2G cellular, Cellular Digital Packet Data (CDPD), Global System for Mobile Communications (GSM), and Mobitex. WLAN, representing wireless local area networks, includes 802.11, Hyper lan, and several others. WPAN, represents wireless personal area network technologies such as Bluetooth and Infrared. The security services are provided largely by the WEP (Wired Equivalent Privacy) protocol to protect link-level data during wireless transmission between clients and access points. That is, WEP does not provide end-to-end security but only for the wireless portion of the connection.

Keywords: wireless lan, wired equivalent privacy, wireless network security, wlan security

Procedia PDF Downloads 535
3233 The Development of Psychosis in Offenders and Its Relationship to Crime

Authors: Belinda Crissman

Abstract:

Serious mental disorder is greatly overrepresented in prisoners compared to the general community, with consequences for prison management, recidivism and the prisoners themselves. Incarcerated individuals with psychotic disorders experience insufficient detection and treatment and higher rates of suicide in custody. However direct evidence to explain the overrepresentation of individuals with psychosis in prisons is sparse. The current study aimed to use a life course criminology perspective to answer two key questions: 1) What is the temporal relationship between psychosis and offending (does first mental health contact precede first recorded offence, or does the offending precede the mental health diagnosis)? 2) Are there key temporal points or system contacts prior to incarceration that could be identified as opportunities for early intervention? Data from the innovative Queensland Linkage project was used to link individuals with their corrections, health and relevant social service systems to answer these questions.

Keywords: mental disorder, crime, life course criminology, prevention

Procedia PDF Downloads 109
3232 Comparative Study of Sound Intensity in Individuals Diagnosed with Antisocial Personality Disorder and Normal People

Authors: Nadia Warmilee

Abstract:

This study is s descriptive-analytical research and it aims at studying sound intensity in individuals with antisocial personality disorder and ordinary persons. Data were collected from experimental and control groups by interviews and a field research. Population was all male Iranian with antisocial personality disorder that three of them (a murderer and two individuals with antisocial personality disorder (APD) who have not committed any crimes yet) were selected purposefully. They were compared to three non-affected people. PRAAT software has been used to analyze the data. Results of this study show that there is a significant relationship between dysthymia and sound intensity values. Antisocial personality disorder also affects sound intensity fluctuations. The values of sound intensity are higher in non-affected people than affected one whilst these values are more monotonous. T-test was used to study significance or in significance of sound intensity difference in producing vowels.

Keywords: Acoustics, Sound Intensity, Antisocial Personality Disorder, Psycholinguistics

Procedia PDF Downloads 97
3231 How Rational Decision-Making Mechanisms of Individuals Are Corrupted under the Presence of Others and the Reflection of This on Financial Crisis Management Situations

Authors: Gultekin Gurcay

Abstract:

It is known that the most crucial influence of the psychological, social and emotional factors that affect any human behavior is to corrupt the rational decision making mechanism of the individuals and cause them to display irrational behaviors. In this regard, the social context of human beings influences the rationality of our decisions, and people tend to display different behaviors when they were alone compared to when they were surrounded by others. At this point, the interaction and interdependence of the behavioral finance and economics with the area of social psychology comes, where intentions and the behaviors of the individuals are being analyzed in the actual or implied presence of others comes into prominence. Within the context of this study, the prevalent theories of behavioral finance, which are The Prospect Theory, The Utility Theory Given Uncertainty and the Five Axioms of Choice under Uncertainty, Veblen’s Hidden Utility Theory, and the concept of ‘Overreaction’ has been examined and demonstrated; and the meaning, existence and validity of these theories together with the social context has been assessed. Finally, in this study the behavior of the individuals in financial crisis situations where the majority of the society is being affected from the same negative conditions at the same time has been analyzed, by taking into account how individual behavior will change according to the presence of the others.

Keywords: conditional variance coefficient, financial crisis, garch model, stock market

Procedia PDF Downloads 219
3230 Improving Security in Healthcare Applications Using Federated Learning System With Blockchain Technology

Authors: Aofan Liu, Qianqian Tan, Burra Venkata Durga Kumar

Abstract:

Data security is of the utmost importance in the healthcare area, as sensitive patient information is constantly sent around and analyzed by many different parties. The use of federated learning, which enables data to be evaluated locally on devices rather than being transferred to a central server, has emerged as a potential solution for protecting the privacy of user information. To protect against data breaches and unauthorized access, federated learning alone might not be adequate. In this context, the application of blockchain technology could provide the system extra protection. This study proposes a distributed federated learning system that is built on blockchain technology in order to enhance security in healthcare. This makes it possible for a wide variety of healthcare providers to work together on data analysis without raising concerns about the confidentiality of the data. The technical aspects of the system, including as the design and implementation of distributed learning algorithms, consensus mechanisms, and smart contracts, are also investigated as part of this process. The technique that was offered is a workable alternative that addresses concerns about the safety of healthcare while also fostering collaborative research and the interchange of data.

Keywords: data privacy, distributed system, federated learning, machine learning

Procedia PDF Downloads 84
3229 The Effectiveness of Social Story with the Help Smart Board use to Teach Social Skills for Preschool Children with ASD

Authors: Dilay Akgun Giray

Abstract:

Basic insuffiency spaces of ASD diagnosed individuals can be grouped as cognitive and academic characteristics, communicational characteristics, social characteristics and emotional characteristics. Referring to the features that children with ASD exhibit on social events, it is clear they have limitations for several social skills. One of the evidence based practices which has been developed and used for the limitations of definite social skills for individuals with autism is “Social Story Method”. Social stories was designed and applied for the first time in 1991, a special education teacher, in order to acquire social skills and improve the existing social skills for children with ASD. Many studies have revealed the effectiveness of social stories for teaching the social skills to individuals with ASD. In this study, three social skills that the child ,who was diagnosed ASD, is going to need primarily will be studied with smart board. This study is multiple probe across-behavior design which is one of the single subject research models.

Keywords: authism spectrum disorders, social skills, social story, smart board

Procedia PDF Downloads 452
3228 Attachment and Memories: Activating Attachment in College Students through Narrative-Based Methods

Authors: Catherine Wright, Kate Luedke

Abstract:

This paper questions whether or not individuals who had been exposed to narratives describing secure and insecure-avoidant attachment styles experienced temporary changes in their attachment style when compared to individuals who had been exposed to neutral narratives. The Attachment Style Questionnaire (or ASQ) developed by Feeney, Noller, and Hanrahan in 1994 was utilized to assess attachment style. Participants filled out a truncated version of the ASQ prior to reading the respective narratives assigned to their groups, and filled out the entirety of the ASQ after reading the narratives. Utilizing a one-way independent groups ANOVA, researchers found that the group which read the insecure-avoidant narrative experienced a statistically significant decrease in secure attachment, as did the group which read the secure narrative. The control group, however, experienced a statistically significant increase in secure attachment. Based on these findings, researchers concluded that narratives may have the ability to call attention to parental shortcomings that individuals have experienced in the forms of reminding individuals of positive experiences that they were not able to experience while spending time with their parental figures and calling attention to the shortcomings of said parental figures by reminding them of the negative experiences which they did have with them.

Keywords: attachment, insecure-avoidant, memory, secure

Procedia PDF Downloads 376
3227 Cloud Monitoring and Performance Optimization Ensuring High Availability

Authors: Inayat Ur Rehman, Georgia Sakellari

Abstract:

Cloud computing has evolved into a vital technology for businesses, offering scalability, flexibility, and cost-effectiveness. However, maintaining high availability and optimal performance in the cloud is crucial for reliable services. This paper explores the significance of cloud monitoring and performance optimization in sustaining the high availability of cloud-based systems. It discusses diverse monitoring tools, techniques, and best practices for continually assessing the health and performance of cloud resources. The paper also delves into performance optimization strategies, including resource allocation, load balancing, and auto-scaling, to ensure efficient resource utilization and responsiveness. Addressing potential challenges in cloud monitoring and optimization, the paper offers insights into data security and privacy considerations. Through this thorough analysis, the paper aims to underscore the importance of cloud monitoring and performance optimization for ensuring a seamless and highly available cloud computing environment.

Keywords: cloud computing, cloud monitoring, performance optimization, high availability, scalability, resource allocation, load balancing, auto-scaling, data security, data privacy

Procedia PDF Downloads 31
3226 Life-Long Fitness Promotion, Recreational Opportunities-Social Interaction for the Visual Impaired Learner

Authors: Zasha Romero

Abstract:

This poster will detail a family oriented event which introduced individuals with visual impairments and individuals with secondary disabilities to social interaction and helped promote life-long fitness and recreational skills. Purpose: The poster will detail a workshop conducted for individuals with visual impairments, individuals with secondary disabilities and their families. Methods: Families from all over the South Texas were invited through schools and different non-profit organizations and came together for a day full recreational games in an effort to promote life-long fitness, recreational opportunities as well as social interactions. Some of the activities that participants and their families participated in were tennis, dance, swimming, baseball, etc. all activities were developed to engage the learner with visual impairments as well as secondary disabilities. Implications: This workshop was done in collaboration with different non-profit institutions to create awareness and provide opportunities for physical fitness, social interaction, and life-long fitness skills associated with the activities presented. The workshop provided collaboration amongst different entities and novel ideas to create opportunities for a typically underserved population.

Keywords: engagement, awareness, underserved population, inclusion, collaboration

Procedia PDF Downloads 336
3225 A Comparative and Doctrinal Analysis towards the Investigation of a Right to Be Forgotten in Hong Kong

Authors: Jojo Y. C. Mo

Abstract:

Memories are good. They remind us of people, places and experiences that we cherish. But memories cannot be changed and there may well be memories that we do not want to remember. This is particularly true in relation to information which causes us embarrassment and humiliation or simply because it is private – we all want to erase or delete such information. This desire to delete is recently recognised by the Court of Justice of the European Union in the 2014 case of Google Spain SL, Google Inc. v Agencia Española de Protección de Datos, Mario Costeja González in which the court ordered Google to remove links to some information about the complainant which he wished to be removed. This so-called ‘right to be forgotten’ received serious attention and significantly, the European Council and the European Parliament enacted the General Data Protection Regulation (GDPR) to provide a more structured and normative framework for implementation of right to be forgotten across the EU. This development in data protection laws will, undoubtedly, have significant impact on companies and co-operations not just within the EU but outside as well. Hong Kong, being one of the world’s leading financial and commercial center as well as one of the first jurisdictions in Asia to implement a comprehensive piece of data protection legislation, is therefore a jurisdiction that is worth looking into. This article/project aims to investigate the following: a) whether there is a right to be forgotten under the existing Hong Kong data protection legislation b) if not, whether such a provision is necessary and why. This article utilises a comparative methodology based on a study of primary and secondary resources, including scholarly articles, government and law commission reports and working papers and relevant international treaties, constitutional documents, case law and legislation. The author will primarily engage literature and case-law review as well as comparative and doctrinal analyses. The completion of this article will provide privacy researchers with more concrete principles and data to conduct further research on privacy and data protection in Hong Kong and internationally and will provide a basis for policy makers in assessing the rationale and need for a right to be forgotten in Hong Kong.

Keywords: privacy, right to be forgotten, data protection, Hong Kong

Procedia PDF Downloads 162
3224 Of Digital Games and Dignity: Rationalizing E-Sports Amidst Stereotypes Associated with Gamers

Authors: Sarthak Mohapatra, Ajith Babu, Shyam Prasad Ghosh

Abstract:

The community of gamers has been at the crux of stigmatization and marginalization by the larger society, resulting in dignity erosion. India presents a unique context where e-sports have recently seen large-scale investments, a massive userbase, and appreciable demand for gaming as a career option. Yet the apprehension towards gaming is salient among parents and non-gamers who engage in the de-dignification of gamers, by advocating the discourse of violence promotion via video games. Even the government is relentless in banning games due to data privacy issues. Thus, the current study explores the experiences of gamers and how they navigate these de-dignifying circumstances. The study follows an exploratory qualitative approach where in-depth interviews are used as data collection tools guided by a semi-structured questionnaire. A total of 25 individuals were interviewed comprising casual gamers, professional gamers, and individuals who are indirectly impacted by gaming including parents, relatives, and friends of gamers. Thematic analysis via three-level coding is used to arrive at broad themes (categories) and their sub-themes. The results indicate that the de-dignification of gamers results from attaching stereotypes of introversion, aggression, low intelligence, and low aspirations to them. It is interesting to note that the intensity of de-dignification varies and is more salient in violent shooting games which are perceived to require low cognitive resources to master. The moral disengagement of gamers while playing violent video games becomes the basis for de-dignification. Findings reveal that circumventing de-dignification required gamers to engage in several tactics that included playing behind closed doors, consciously hiding the gamer identity, rationalizing behavior by idolizing professionals, bragging about achievements within the game, and so on. Theoretically, it contributes to dignity and social identity literature by focusing on stereotyping and stigmatization. From a policy perspective, improving legitimacy toward gaming is expected to improve the social standing of gamers and professionals. For practitioners, it is important that proper channels of promotion and communication are used to educate the non-gamers so that the stereotypes blur away.

Keywords: dignity, social identity, stereotyping, video games

Procedia PDF Downloads 70
3223 Ethics Can Enable Open Source Data Research

Authors: Dragana Calic

Abstract:

The openness, availability and the sheer volume of big data have provided, what some regard as, an invaluable and rich dataset. Researchers, businesses, advertising agencies, medical institutions, to name only a few, collect, share, and analyze this data to enable their processes and decision making. However, there are important ethical considerations associated with the use of big data. The rapidly evolving nature of online technologies has overtaken the many legislative, privacy, and ethical frameworks and principles that exist. For example, should we obtain consent to use people’s online data, and under what circumstances can privacy considerations be overridden? Current guidance on how to appropriately and ethically handle big data is inconsistent. Consequently, this paper focuses on two quite distinct but related ethical considerations that are at the core of the use of big data for research purposes. They include empowering the producers of data and empowering researchers who want to study big data. The first consideration focuses on informed consent which is at the core of empowering producers of data. In this paper, we discuss some of the complexities associated with informed consent and consider studies of producers’ perceptions to inform research ethics guidelines and practice. The second consideration focuses on the researcher. Similarly, we explore studies that focus on researchers’ perceptions and experiences.

Keywords: big data, ethics, producers’ perceptions, researchers’ perceptions

Procedia PDF Downloads 265
3222 The Reasons behind Individuals to Join Terrorist Organizations: Recruitment from Outside

Authors: Murat Sözen

Abstract:

Today terrorism is gaining momentum again. Parallel to this, it hurts more than before because it has victims from not only its own locations but also remote places. As victims are from outside, militants are likewise from own location and outside. What made these individuals join the terrorist organizations and how these organizations recruit militants are still unanswered. The purpose of this work is to find reasons of joining and power of recruiting. In addition, the role of most popular tool of recruiting, ‘social media’ will be examined.

Keywords: recruitment, social media, recruitment, militants

Procedia PDF Downloads 322
3221 The Effects of Perceived Service Quality on Customers' Satisfaction, Trust and Loyalty in Online Shopping: A Case of Saudi Consumers' Perspectives

Authors: Nawt Almutairi, Ramzi El-Haddadeh

Abstract:

With the extensive increase in the number of online shops, loyalty becomes the most purpose for e-retailers by which they can maintain their exit customers and regular income instead of spending large deal of money to target new segmentation. To obtain customers’ loyalty e-marketers should firstly satisfy customers by providing a high quality of services that could fulfil their demand. They have to satisfy them to trust the web-site then increase their intention to re-visit it. This study intends to investigate to what extend the elements of e-service quality presented in the literature affect customers’ satisfaction and how these influences contribute to customers’ trust and loyalty. Three dimensions of service quality are estimated. The first element is web-site interactivity, which is perceived the quality of interactive support and the accessible communications-tool. The second aspect is security/privacy, which is perceived the quality of controlling security and privacy while transaction over the web-site. The third element is web-design that perceived a pleasant user interface with visual appealing. These elements present positive effects on shoppers’ satisfaction. Thus, To examine the proposed constructs of this research, some measurements scale-items adapted from similar prior studies. Survey data collected online from Saudi customers (n=106) were utilized to test the research hypotheses. After that, the hypotheses were analyzed by using a variety of regression tools. The analytical results of this study propose that perceived quality of interactivity and security/privacy affects customers’ satisfaction. As well as trust seems to be a substantial construct that highly affects loyalty in online shopping. This study provides a developed model to obtain a simple understanding of the series of customers’ loyalty in online shopping. One construct presenting in the research model is web-design appears to be not important antecedent of satisfaction (the path to loyalty) in online shopping.

Keywords: e-service, satisfaction, trust, loyalty

Procedia PDF Downloads 227
3220 Shifting Gender Roles: Exploring Settler Communities in Guam and Bali

Authors: Rochelle Alviz, Kirk Johnson

Abstract:

This study explores the changing nature of gender roles in two traditional island societies. The research focuses particularly on the settler populations within each community (the Filipinos in Guam and the Javanese in Bali). The research seeks to understand the influence of both the forces of globalization and the dynamics of competing cultures on gender roles. To achieve this, a qualitative research design is used, employing in-depth interviews with individuals from both communities and field notes from participant observation. The study finds that globalization and competing cultural norms have influenced traditional gender roles and expectations in two primary areas of social life: the family and the economy. The importance of these two areas of social life to both communities has led to changes and adaptations in gender roles. In the family context, individuals reconcile their traditional gender roles from their country of origin with the dominant or indigenous gender roles of their new place of residence. In the economic context, the study finds that gender roles influence economic participation, including the types of jobs individuals pursue based on their gender roles. The results of the study provide valuable insights into the complexities and nuances of gender roles and the different factors that influence their evolution and adaptation over time. The research also highlights the influence of globalization on traditional societies and settler populations and the ways in which individuals navigate the competing cultural norms and expectations surrounding gender roles. The research contributes to a better understanding of the interplay between culture, globalization, and gender roles and the implications of these changes for individuals and communities.

Keywords: gender roles, culture, settler communities, family, economy, Guam, Bali, globalization

Procedia PDF Downloads 56
3219 Impacts of Racialization: Exploring the Relationships between Racial Discrimination, Racial Identity, and Activism

Authors: Brianna Z. Ross, Jonathan N. Livingston

Abstract:

Given that discussions of racism and racial tensions have become more salient, there is a need to evaluate the impacts of racialization among Black individuals. Racial discrimination has become one of the most common experiences within the Black American population. Likewise, Black individuals have indicated a need to address their racial identities at an earlier age than their non-Black peers. Further, Black individuals have been found at the forefront of multiple social and political movements, including but not limited to the Civil Rights Movement, Black Lives Matter, MeToo, and Say Her Name. Moreover, the present study sought to explore the predictive relationships that exist between racial discrimination, racial identity, and activism in the Black community. The results of standard and hierarchical regression analyses revealed that racial discrimination and racial identity significantly predict each other, but only racial discrimination is a significant predictor for the relationship to activism. Nonetheless, the results from this study will provide a basis for social scientists to better understand the impacts of racialization on the Black American population.

Keywords: activism, racialization, racial discrimination, racial identity

Procedia PDF Downloads 116
3218 System for the Detecting of Fake Profiles on Online Social Networks Using Machine Learning and the Bio-Inspired Algorithms

Authors: Sekkal Nawel, Mahammed Nadir

Abstract:

The proliferation of online activities on Online Social Networks (OSNs) has captured significant user attention. However, this growth has been hindered by the emergence of fraudulent accounts that do not represent real individuals and violate privacy regulations within social network communities. Consequently, it is imperative to identify and remove these profiles to enhance the security of OSN users. In recent years, researchers have turned to machine learning (ML) to develop strategies and methods to tackle this issue. Numerous studies have been conducted in this field to compare various ML-based techniques. However, the existing literature still lacks a comprehensive examination, especially considering different OSN platforms. Additionally, the utilization of bio-inspired algorithms has been largely overlooked. Our study conducts an extensive comparison analysis of various fake profile detection techniques in online social networks. The results of our study indicate that supervised models, along with other machine learning techniques, as well as unsupervised models, are effective for detecting false profiles in social media. To achieve optimal results, we have incorporated six bio-inspired algorithms to enhance the performance of fake profile identification results.

Keywords: machine learning, bio-inspired algorithm, detection, fake profile, system, social network

Procedia PDF Downloads 40
3217 The Perspective of Using Maiden Name: A Sample of Konya-Turkey

Authors: Manar Aslan, Ayfer Karaaslan

Abstract:

Purpose: The aim of this study was to determine the attitude towards the use of the maiden name of the Turkish people. Methods: For the study group who lives in the center of Konya/Turkey and people aged 16-65 years, as the sample identified 1,000 people with simple random between the months of February to May 2013. The survey created by the researchers, for investigating the perception of using the maiden name of the people of Konya consists of 25 questions with demographic characteristics. For statistical analysis of the obtained data made using SPSS 20, chi-square test and one-way analysis of variance methods of frequency, average, were evaluated as percentage distribution. Results: The traditional view of Konya increasing age increases, decreases the desire to use her maiden name. So look favorably than younger generations to use maiden name. In parallel with the level of educational levels are increasing utilization rates maiden name. Thus, individuals with higher levels of education are more positive look at the use of her maiden name. Looking at the marital status; compared to individuals with a single against the use of her maiden name of individuals who are married are more negative attitude.

Keywords: Maiden name, public viewpoint, utilization, women

Procedia PDF Downloads 273
3216 Technology for Enhancing the Learning and Teaching Experience in Higher Education

Authors: Sara M. Ismael, Ali H. Al-Badi

Abstract:

The rapid development and growth of technology has changed the method of obtaining information for educators and learners. Technology has created a new world of collaboration and communication among people. Incorporating new technology into the teaching process can enhance learning outcomes. Billions of individuals across the world are now connected together, and are cooperating and contributing their knowledge and intelligence. Time is no longer wasted in waiting until the teacher is ready to share information as learners can go online and get it immediately. The objectives of this paper are to understand the reasons why changes in teaching and learning methods are necessary, to find ways of improving them, and to investigate the challenges that present themselves in the adoption of new ICT tools in higher education institutes. To achieve these objectives two primary research methods were used: questionnaires, which were distributed among students at higher educational institutes and multiple interviews with faculty members (teachers) from different colleges and universities, which were conducted to find out why teaching and learning methodology should change. The findings show that both learners and educators agree that educational technology plays a significant role in enhancing instructors’ teaching style and students’ overall learning experience; however, time constraints, privacy issues, and not being provided with enough up-to-date technology do create some challenges.

Keywords: e-books, educational technology, educators, e-learning, learners, social media, Web 2.0, LMS

Procedia PDF Downloads 247
3215 Modeling Acceptability of a Personalized and Contextualized Radio Embedded in Vehicles

Authors: Ludivine Gueho, Sylvain Fleury, Eric Jamet

Abstract:

Driver distraction is known to be a major contributing factor of car accidents. Since many years, constructors have been designing embedded technologies to face this problem and reduce distraction. Being able to predict user acceptance would further be helpful in the development process to build appropriate systems. The present research aims at modelling the acceptability of a specific system, an innovative personalized and contextualized embedded radio, through an online survey of 202 people in France that assessed the psychological variables determining intentions to use the system. The questionnaire instantiated the dimensions of the extended version of the UTAUT acceptability model. Because of the specific features of the system assessed, we added 4 dimensions: perceived security, anxiety, trust and privacy concerns. Results showed that hedonic motivation, i.e., the fun or pleasure derived from using a technology, and performance expectancy, i.e., the degree to which individuals believe that the characteristics of the system meet their needs, are the most important dimensions in determining behavioral intentions about the innovative radio. To a lesser extent, social influence, i.e., the degree to which individuals think they can use the system while respecting their social group’s norms and while giving a positive image of themselves, had an effect on behavioral intentions. Moreover, trust, that is, the positive belief about the perceived reliability of, dependability of, and confidence in a person, object or process, had a significant effect, mediated by performance expectancy. In an applicative way, the present research reveals that, to be accepted, in-car embedded new technology has to address individual needs, for instance by facilitating the driving activity or by providing useful information. If it shows hedonic qualities by being entertaining, pretty or comfortable, this may improve the intentions to use it. Therefore, it is clearly important to include reflection about user experience in the design process. Finally, the users have to be reassured on the system’s reliability. For example, improving the transparency of the system by providing information about the system functioning, could improve trust. These results bring some highlights on determinant of acceptance of an in-vehicle technology and are useful for constructors to design acceptable systems.

Keywords: acceptability, innovative embedded radio, structural equation, user-centric evaluation, UTAUT

Procedia PDF Downloads 246
3214 Tetraploid Induction in the Yellowtail Tetra Astyanax altiparanae

Authors: Nivaldo Ferreira do Nascimento, Matheus Pereira-Santos, Nycolas Levy-Pereira, José Augusto Senhorini, George Shigueki Yasui, Laura Satiko Okada Nakaghi

Abstract:

Tetraploid individuals, which could produce diploid gametes, can be used for production of 100% triploid fish. Therefore, the aim of this study was to develop a tetraploidization protocol for A. altiparanae. We tested the effect of heat shock (40 °C; 2 min) at 16, 18, 20, 22, 24 and 26 minutes post fertilization (mpf). Untreated eggs were used as control. After hatching, ploidy status of the larvae was checked by flow cytometry. No difference were observed for the hatching rate between all treatments (P = 0.5974). However, we observed an increase in the larval abnormality in the heat shock treatments, in special at 22 (82.17 ± 6.66%) 24 (78.31 ±7.28%) and 26 mpf (79.01 ± 7.85%) in comparison with the control group (12.87 ± 4.46%). No tetraploid was observed at 16 and 18 mpf. The higher number of tetraploid individuals (52/55) was observed at 26 mpf. Our results showed that high percentages of tetraploids are obtained by heat shock (40°C; 2min) at 26 mpf, which could enable the mass production of triploid individuals in A. altiparanae.

Keywords: chromosome manipulation, polyploidy, flow cytometry, tetraploidization

Procedia PDF Downloads 305