Search results for: trust level
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 13035

Search results for: trust level

12855 The Negative Effects of Controlled Motivation on Mathematics Achievement

Authors: John E. Boberg, Steven J. Bourgeois

Abstract:

The decline in student engagement and motivation through the middle years is well documented and clearly associated with a decline in mathematics achievement that persists through high school. To combat this trend and, very often, to meet high-stakes accountability standards, a growing number of parents, teachers, and schools have implemented various methods to incentivize learning. However, according to Self-Determination Theory, forms of incentivized learning such as public praise, tangible rewards, or threats of punishment tend to undermine intrinsic motivation and learning. By focusing on external forms of motivation that thwart autonomy in children, adults also potentially threaten relatedness measures such as trust and emotional engagement. Furthermore, these controlling motivational techniques tend to promote shallow forms of cognitive engagement at the expense of more effective deep processing strategies. Therefore, any short-term gains in apparent engagement or test scores are overshadowed by long-term diminished motivation, resulting in inauthentic approaches to learning and lower achievement. The current study focuses on the relationships between student trust, engagement, and motivation during these crucial years as students transition from elementary to middle school. In order to test the effects of controlled motivational techniques on achievement in mathematics, this quantitative study was conducted on a convenience sample of 22 elementary and middle schools from a single public charter school district in the south-central United States. The study employed multi-source data from students (N = 1,054), parents (N = 7,166), and teachers (N = 356), along with student achievement data and contextual campus variables. Cross-sectional questionnaires were used to measure the students’ self-regulated learning, emotional and cognitive engagement, and trust in teachers. Parents responded to a single item on incentivizing the academic performance of their child, and teachers responded to a series of questions about their acceptance of various incentive strategies. Structural equation modeling (SEM) was used to evaluate model fit and analyze the direct and indirect effects of the predictor variables on achievement. Although a student’s trust in teacher positively predicted both emotional and cognitive engagement, none of these three predictors accounted for any variance in achievement in mathematics. The parents’ use of incentives, on the other hand, predicted a student’s perception of his or her controlled motivation, and these two variables had significant negative effects on achievement. While controlled motivation had the greatest effects on achievement, parental incentives demonstrated both direct and indirect effects on achievement through the students’ self-reported controlled motivation. Comparing upper elementary student data with middle-school student data revealed that controlling forms of motivation may be taking their toll on student trust and engagement over time. While parental incentives positively predicted both cognitive and emotional engagement in the younger sub-group, such forms of controlling motivation negatively predicted both trust in teachers and emotional engagement in the middle-school sub-group. These findings support the claims, posited by Self-Determination Theory, about the dangers of incentivizing learning. Short-term gains belie the underlying damage to motivational processes that lead to decreased intrinsic motivation and achievement. Such practices also appear to thwart basic human needs such as relatedness.

Keywords: controlled motivation, student engagement, incentivized learning, mathematics achievement, self-determination theory, student trust

Procedia PDF Downloads 201
12854 The Role of Brand Loyalty in Generating Positive Word of Mouth among Malaysian Hypermarket Customers

Authors: S. R. Nikhashemi, Laily Haj Paim, Ali Khatibi

Abstract:

Structural Equation Modeling (SEM) was used to test a hypothesized model explaining Malaysian hypermarket customers’ perceptions of brand trust (BT), customer perceived value (CPV) and perceived service quality (PSQ) on building their brand loyalty (CBL) and generating positive word-of-mouth communication (WOM). Self-administered questionnaires were used to collect data from 374 Malaysian hypermarket customers from Mydin, Tesco, Aeon Big and Giant in Kuala Lumpur, a metropolitan city of Malaysia. The data strongly supported the model exhibiting that BT, CPV and PSQ are prerequisite factors in building customer brand loyalty, while PSQ has the strongest effect on prediction of customer brand loyalty compared to other factors. Besides, the present study suggests the effect of the aforementioned factors via customer brand loyalty strongly contributes to generate positive word of mouth communication.

Keywords: brand trust, perceived value, Perceived Service Quality, Brand loyalty, positive word of mouth communication

Procedia PDF Downloads 465
12853 Social Network Analysis in Water Governance

Authors: Faribaebrahimi, Mehdi Ghorbani, Mohsen Mohsenisaravi

Abstract:

Ecosystem management is complex because of natural and human issues. To cope with this complexity water governance is recommended since it involves all stakeholders including people, governmental and non-governmental organization who related to environmental systems. Water governance emphasizes on water co-management through consideration of all the stakeholders in the form of social and organizational network. In this research, to illustrate indicators of water governance in Dorood watershed, in Shemiranat region of Iran, social network analysis had been applied. The results revealed that social cohesion among pastoralists in Dorood is medium because of trust links, while link sustainability is weak to medium. According to the results, some pastoralists have high social power and therefore are key actors in the utilization network, regarding to centrality index and trust links. The results also demonstrated that Agricultural Development Office and (Shemshak-Darbandsar Islamic) Council are key actors in rangeland co-management, based on centrality index in rangeland institutional network at regional scale in Shemiranat district.

Keywords: social network analysis, water governance, organizational network, water co-management

Procedia PDF Downloads 330
12852 Information Technology (IT) Outsourcing and the Challenges of Implementation in Financial Industries: A Case Study of Guarantee Trust Assurance PLC

Authors: Salim Ahmad, Ahamed Sani Kazaure, Haruna Musa

Abstract:

Outsourcing had been the contractual relationship in which the responsibility for a function or task is handed over to an outside firm for a fixed period of time which is not the same as contracting where a specific one-off task is allocated to an external business; therefore in information technology a specialist area such as maintenance of web servers is controlled by an outside firm or if the department is not a critical factor the whole IT section may be outsourced. Organisation contracts is frequently a major area in successful outsourcing relationship, whereby the contracts specify the right, liability and expectation of the vendor and contracts are mostly of high value and last for very long. Therefore, in this research one particular project that is been outsourced for the financial industry (Guarantee Trust Assurance PlC) is been discussed along with the approach used and the various problems encountered, though Outsourcing is not necessarily a perfect and easy way out for business. It is extremely critical for a company to look at all the aspect of outsourcing before deciding to use it as an instrument for development. Moreover, critical analysis of the management issues encountered while implementing the outsourcing project have been fully discussed in the paper.

Keywords: outsourcing, techniques used in outsourcing, challenges of outsourcing implementation, management issues during implementation of outsourcing project

Procedia PDF Downloads 357
12851 Evidence from the Ashanti Region in Ghana: A Correlation Between Principal Instructional Leadership and School Performance in Senior High Schools

Authors: Blessing Dwumah Manu, Dawn Wallin

Abstract:

This study aims to explore school principal instructional leadership capabilities (Robinson, 2010) that support school performance in senior high schools in Ghana’s Northern Region. It explores the ways in which leaders (a) use deep leadership content knowledge to (b) solve complex school-based problems while (c) building relational trust with staff, parents, and students as they engage in the following instructional leadership dimensions: establishing goals and expectations; resourcing strategically; ensuring quality teaching; leading teacher learning and development and ensuring an orderly and safe environment (Patuawa et al, 2013). The proposed research utilizes a constructivist approach to explore the experiences of 18 school representatives (including principals, deputy principals, department heads, teachers, parents, and students) through an interview method.

Keywords: instructional leadership, leadership content knowledge, solving complex problems, building relational trust and school performance

Procedia PDF Downloads 90
12850 Illustrative Effects of Social Capital on Perceived Health Status and Quality of Life among Older Adult in India: Evidence from WHO-Study on Global AGEing and Adults Health India

Authors: Himansu, Bedanga Talukdar

Abstract:

The aim of present study is to investigate the prevalence of various health outcomes and quality of life and analyzes the moderating role of social capital on health outcomes (i.e., self-rated good health (SRH), depression, functional health and quality of life) among elderly in India. Using WHO Study on Global AGEing and adults health (SAGE) data, with sample of 6559 elderly between 50 and above (Mage=61.81, SD=9.00) age were selected for analysis. Multivariate analysis accessed the prevalence of SRH, depression, functional limitation and quality of life among older adults. Logistic regression evaluates the effect of social capital along with other co-founders on SRH, depression, and functional limitation, whereas linear regression evaluates the effect of social capital with other co-founders on quality of life (QoL) among elderly. Empirical results reveal that (74%) of respondents were married, (70%) having low social action, (46%) medium sociability, (45%) low trust-solidarity, (58%) high safety, (65%) medium civic engagement and 37% reported medium psychological resources. The multivariate analysis, explains (SRH) is associated with age, female, having education, higher social action great trust, safety and greater psychological resources. Depression among elderly is greatly related to age, sex, education and higher wealth, higher sociability, having psychological resources. QoL is negatively associated with age, sex, being Muslim, whereas positive associated with higher education, currently married, civic engagement, having wealth, social action, trust and solidarity, safeness, and strong psychological resources.

Keywords: depressive symptom, functional limitation, older adults, quality of life, self rated health, social capital

Procedia PDF Downloads 205
12849 Gender and Citizen Participation at the Local Governments: A Case of Vietnam

Authors: Trinh Hoang Hong Hue

Abstract:

Citizen Participation has been largely considered as an important objective of improving democracy and government decision-making in Vietnam recently. The Public Administration Performance Index Survey data (PAPI) indicated that citizens in provinces that have a higher proportion of male often less participate in local governance than those in provinces that have lower proportion of male. That means Vietnamese women more actively participate at the local governance rather than men. Thus this study will explore factors involving gender differences that impact on citizen participation at the local level. Applying qualitative approach, mainly in-depth interview, this study explores four diverse perspectives on enhancing citizen participation for both women and men at the local governance including civic knowledge; the trust of citizens; suitable policies of local government; and the role of NGOs. Furthermore, this study also points out two crucial reasons that are leading to the gender differences of citizen participation at the local level. Firstly, because Vietnamese women play the main role in family financial management; then they are willing to highly contribute to ‘voluntary contributions’; one of the four sub-dimensions of the concept ‘citizen participation’ of PAPI. Secondly, in Vietnam, women are deeply prone to be interested in the small issues at the local governance; whereas men are much keen on the bigger issues at national and international governance.

Keywords: citizen participation, gender, women, local governance, PAPI, Vietnam

Procedia PDF Downloads 120
12848 The Use of Culture as a Campaign Method in Indonesian Parliamentary Election

Authors: Azza Habibullah

Abstract:

The principal objective of this paper is to show the use of participatory culture in the parliamentarian campaign. The use of this method has always been non-popular amongst the parliamentarian candidates due to the amount of times and energy that they need to spent with the constituents. However, due to many parliamentarian corruption cases in the last five years period, some political party have been losing peoples trust. That political party trust lost had also affecting the parliamentarian candidates electability, so they invent some creative campaign method that involving their constituent with more intimates and friendly environment. In this paper, an observation is done to a parliamentarian candidate from Partai Keadilan Sejahtera (Prosperous Justice Party) in Bandung and Cimahi City area, West Java. This Parliamentraian candidate is known for her personal-approach campaign method such as a puppet show, hanging out with group of ex-bike gang leaders, and going fishing with the constituent. This paper will compare her method with other parliamentarian candidates from the same party as her that mostly use mainstream campaign method such as open speech, print media, an other one way campaign method. While the other parliamentarian candidates failed to reach the parliamentarian threshold, the participatory method had proven as an effective method.

Keywords: participatory culture, Indonesian parliamentary election, Prosperous Justice Party, electability

Procedia PDF Downloads 247
12847 Traffic Noise Study at Intersection in Bangalore: A Case Study

Authors: Shiva Kumar G.

Abstract:

The present study is to know the level of noises emanated from vehicles in intersections located in urban areas using Sound Level Meter and the possibility of reducing noise levels through traffic flow optimization. The main objective is to study traffic noise level of the Intersections located at on-going metro construction activities and which are away from metro construction activities. To compare traffic noise level between stop phase, go phase and drive phase at the Intersections. To study the effect of traffic noise level of directional movement of traffic and variation in noise level during day and night times. The range of Noise level observed at intersections is between 60 to 105 decibel. The noise level of stop and drive phases were minimum and almost same where go phase had maximum noise level. By comparing noise level of directional movement of traffic, it has been noticed that Vijayanagar intersection has no significant difference in their noise level and all other intersection has a significant difference in their noise level. By comparing noise level of stop, go and drive phase it has been noticed that there was a significant difference in noise level during peak hours compared to off-peak hour. By comparing noise level between Metro and Non-Metro construction activity intersections it has been noticed that there was a significant difference in noise level. By comparing noise level during day and night times, significant differences in noise level were observed at all intersections.

Keywords: noise, metro and non-metro intersections, traffic flow optimization, stop-go and drive phase

Procedia PDF Downloads 445
12846 Investigating the UAE Residential Valuation System: A Framework for Analysis

Authors: Simon Huston, Ebraheim Lahbash, Ali Parsa

Abstract:

The development of the United Arab Emirates (UAE) into a regional trade, tourism, finance and logistics hub has transformed its real estate markets. However, speculative activity and price volatility remain concerns. UAE residential market values (MV) are exposed to fluctuations in capital flows and migration which in turn are affected by geopolitical uncertainty, oil price volatility, and global investment market sentiment. Internally, a complex interplay between administrative boundaries, land tenure, building quality and evolving location characteristics fragments UAE residential property markets. In short, the UAE Residential Valuation System (UAE-RVS) confronts multiple challenges to collect, filter and analyze relevant information in complex and dynamic spatial and capital markets. A robust (RVS) can mitigate the risk of unhelpful volatility, speculative excess or investment mistakes. The research outlines the institutional, ontological, dynamic, and epistemological issues at play. We highlight the importance of system capabilities, valuation standard salience and stakeholders trust.

Keywords: valuation, property rights, information, institutions, trust, salience

Procedia PDF Downloads 362
12845 Environmental Safety and Occupational Health Risk Assessment for Rocket Static Test

Authors: Phontip Kanlahasuth

Abstract:

This paper presents the environmental safety and occupational health risk assessment of rocket static test by assessing risk level from probability and severity and then appropriately applying the risk control measures. Before the environmental safety and occupational health measures are applied, the serious hazards level is 31%, medium level is 24% and low level is 45%. Once risk control measures are practically implemented, the serious hazard level can be diminished, medium level is 38%, low level is 45% and eliminated level is 17%. It is clearly shown that the environmental safety and occupational health measures can significantly reduce the risk level.

Keywords: rocket static test, hazard, risk, risk assessment, risk analysis, environment, safety, occupational health, acceptable risk, probability, severity, risk level

Procedia PDF Downloads 568
12844 An Empirical Study of Factors that Impact Government E-Services Acceptance by Citizens: Case Study from UAE

Authors: Emad Bataineh, Sara Al-Mutawa

Abstract:

The primary focus of this study is to investigate and identify the perceptions of potential end users relating to factors which impact on e-services acceptance. Technology Acceptance Model (TAM) has been adopted in this study as it can be extended when technologies are introduced. This research validates the developed TAM model and evaluates the variance of the outcome variable (acceptance of e-services). Five factors were adopted as determinants of acceptance of e-services: ease of use, security, trust, web skills, and language. The study was undertaken in the General Directorate of Residency and Foreigners Affairs (GDRFA) in the UAE. A quantitative survey methodology was adopted in this study, which surveyed 466 customers who use the GDRFA e-services. The overall findings revealed that security language, web skills and support significantly affected ease of use and perceived usefulness. However, the trust doesn’t affect the ease of use. Further, ease of use significantly affects intention to use and perceived usefulness while in turn intention to use was influenced by perceived usefulness. This study offers an understanding of people’s adoption of e-government services with the help of established theories such as TAM and various factors that influence the e-government adoption with reference to UAE.

Keywords: e-government portal, e-service, usability, TAM model

Procedia PDF Downloads 410
12843 The Level of Job Satisfaction among English as a Foreign Language Instructors

Authors: Hashem A. Alsamadani

Abstract:

Identifying the level of job satisfaction has many positive benefits for both the worker and employer. The purpose of the study was to examine the overall level of job satisfaction among English as a Foreign Language (EFL) instructors. During the past years, multiple methods were utilized to collect data to determine the level of job satisfaction among teachers. This study was conducted using survey research method. A questionnaire was coded and analyzed using the SPSS. The findings revealed that the overall level of job satisfaction among EFL instructors is high. The study recommended improving conditions of instructors working at public universities so as to gain a high level of job satisfaction and improve outcomes of the teaching-learning process.

Keywords: job satisfaction, EFL teachers, Saudi Arabia, instruction

Procedia PDF Downloads 391
12842 Protecting Privacy and Data Security in Online Business

Authors: Bilquis Ferdousi

Abstract:

With the exponential growth of the online business, the threat to consumers’ privacy and data security has become a serious challenge. This literature review-based study focuses on a better understanding of those threats and what legislative measures have been taken to address those challenges. Research shows that people are increasingly involved in online business using different digital devices and platforms, although this practice varies based on age groups. The threat to consumers’ privacy and data security is a serious hindrance in developing trust among consumers in online businesses. There are some legislative measures taken at the federal and state level to protect consumers’ privacy and data security. The study was based on an extensive review of current literature on protecting consumers’ privacy and data security and legislative measures that have been taken.

Keywords: privacy, data security, legislation, online business

Procedia PDF Downloads 85
12841 Psychosocial Development: The Study of Adaptation and Development and Post-Retirement Satisfaction in Ageing Australians

Authors: Sahar El-Achkar, Mizan Ahmad

Abstract:

Poor adaptation of developmental milestones over the lifespan can significantly impact emotional experiences and Satisfaction with Life (SWL) post-retirement. Thus, it is important to understand how adaptive behaviour over the life course can predict emotional experiences. Broadly emotional experiences are either Positive Affect (PA) or Negative Affect (NA). This study sought to explore the impact of successful adaptation of developmental milestones throughout one’s life on emotional experiences and satisfaction with life following retirement. A cross-sectional self-report survey was completed by 132 Australian retirees between the ages 55 and 70 years. Three hierarchical regression models were fitted, controlling for age and gender, to predict PA, NA, and SWL. The full model predicting PA was statistically significant overall, F (8, 121) = 17.97, p < .001, account for 57% of the variability in PA. Industry/Inferiority were significantly predictive of PA. The full model predicting NA was statistically significant overall, F (8, 121) = 12.00, p < .001, accounting for 51% of the variability in NA. Age and Trust/Mistrust were significantly predictive of NA. The full model predicting NA was statistically significant overall, F (8, 121) = 12.00, p < .001, accounting for 51% of the variability in NA. Age and Trust/Mistrust were significantly predictive of NA. The full model predicting SWL, F (8, 121) = 11.05, p < .001, accounting for 45% of the variability in SWL. Trust/Mistrust and Ego Integrity/Despair were significantly predictive of SWL. A sense of industry post-retirement is important in generating PA. These results highlight that individuals presenting with adaptation and identity issues are likely to present with adjustment challenges and unpleasant emotional experiences post-retirement. This supports the importance of identifying and understanding the benefits of successful adaptation and development throughout the lifespan and its significance for the self-concept. Most importantly, the quality of lives of many may be improved, and the future risk of continued poor emotional experiences and SWL post-retirement may be mitigated. Specifically, the clinical implications of these findings are that they support the promotion of successful adaption over the life course and healthy ageing.

Keywords: adaptation, development, negative affect, positive affect, retirement, satisfaction with life

Procedia PDF Downloads 56
12840 Consumer’s Behavioral Responses to Corporate Social Responsibility Marketing: Mediating Impact of Customer Trust, Emotions, Brand Image, and Brand Attitude

Authors: Yasir Ali Soomro

Abstract:

Companies that demonstrate corporate social responsibilities (CSR) are more likely to withstand any downturn or crises because of the trust built with stakeholders. Many firms are utilizing CSR marketing to improve the interactions with their various stakeholders, mainly the consumers. Most previous research on CSR has focused on the impact of CSR on customer responses and behaviors toward a company. As online food ordering and grocery shopping remains inevitable. This study will investigate structural relationships among consumer positive emotions (CPE) and negative emotions (CNE), Corporate Reputation (CR), Customer Trust (CT), Brand Image (BI), and Brand attitude (BA) on behavioral outcomes such as Online purchase intention (OPI) and Word of mouth (WOM) in retail grocery and food restaurants setting. Hierarchy of Effects Model will be used as theoretical, conceptual framework. The model describes three stages of consumer behavior: (i) cognitive, (ii) affective, and (iii) conative. The study will apply a quantitative method to test the hypotheses; a self-developed questionnaire with non-probability sampling will be utilized to collect data from 500 consumers belonging to generation X, Y, and Z residing in KSA. The study will contribute by providing empirical evidence to support the link between CSR and customer affective and conative experiences in Saudi Arabia. The theoretical contribution of this study will be empirically tested comprehensive model where CPE, CNE, CR, CT, BI, and BA act as mediating variables between the perceived CSR & Online purchase intention (OPI) and Word of mouth (WOM). Further, the study will add more to how the emotional/ psychological process mediates in the CSR literature, especially in the Middle Eastern context. The proposed study will also explain the effect of perceived CSR marketing initiatives directly and indirectly on customer behavioral responses.

Keywords: corporate social responsibility, corporate reputation, consumer emotions, loyalty, online purchase intention, word-of-mouth, structural equation modeling

Procedia PDF Downloads 70
12839 Firm-Created Social Media Communication and Consumer Brand Perceptions

Authors: Rabail Khalid

Abstract:

Social media has changed the business communication strategies in the corporate world. Firms are using social media to reach their maximum stakeholders in minimum time at different social media forums. The current study examines the role of firm-created social media communication on consumer brand perceptions and their loyalty to brand. An online survey is conducted through social media forums including Facebook and Twitter to collect data regarding social media communication of a well-reputed clothing company’s brand in Pakistan. A link is sent to 900 customers of that company. Out of 900 questionnaires, 534 were received. So, the response rate is 59.33%. During data screening and entry, 13 questionnaires are rejected due to incomplete answer. Therefore, 521 questionnaires are completed in all respect and seem to be helpful for the study. So, the positive response rate is 57.89%. The empirical results report positive and significant influence of company-generated social media communication on brand trust, brand equity, and brand loyalty. The findings of this study provide important information to the marketing professionals and brand managers to understand consumer behavior through social media communication.

Keywords: firm-created social media communication, brand trust, brand equity, consumer behavior, brand loyalty

Procedia PDF Downloads 372
12838 The Impact of ChatGPT on the Healthcare Domain: Perspectives from Healthcare Majors

Authors: Su Yen Chen

Abstract:

Extensive research on ChatGPT has revealed its capabilities and limitations across various clinical, educational, and research contexts, emphasizing crucial issues such as accuracy, transparency, and ethical usage. Studies applying the Technology Acceptance Model (TAM) and Uses and Gratifications Theory have deepened our understanding of the factors that drive user acceptance and satisfaction of ChatGPT for general use. These insights are particularly valuable for examining healthcare-specific behaviors, trust levels, and perceived risks. Despite these advancements, there remains a notable gap in our understanding of how general user perceptions of AI translate into its practical applications within the healthcare sector. This study focuses on examining the perceptions of ChatGPT's impact among 266 healthcare majors in Taiwan, exploring its implications for their career development and utility in clinical practice, medical education, and research. By employing a structured survey with precisely defined subscales, this research aims to probe the breadth of ChatGPT's applications within healthcare, assessing both the perceived benefits and the challenges it presents. The findings from the survey reveal that perceptions and usage of ChatGPT among healthcare majors vary significantly, influenced by factors such as its perceived utility, risk, novelty, and trustworthiness. Graduate students and those who perceive ChatGPT as more beneficial and less risky are particularly inclined to use it more frequently. This increased usage is closely linked to significant impacts on personal career development. Furthermore, ChatGPT's perceived usefulness contributes to its broader impact within the healthcare domain, suggesting that both innovation and practical utility are key drivers of acceptance and perceived effectiveness in professional healthcare settings. Trust emerges as an important factor, especially in clinical settings where the stakes are high. The trust that healthcare professionals place in ChatGPT significantly affects its integration into clinical practice and influences outcomes in medical education and research. Thus, ChatGPT's reliability and practical value are critical for its successful adoption in these areas. However, an interesting paradox arises with regard to ease of use. While making ChatGPT more user-friendly is generally seen as beneficial, it also raises concerns among users who have lower levels of trust and perceive higher risks associated with its use. This complex interplay between ease of use and safety concerns necessitates a careful balance, highlighting the need for robust security measures and clear, transparent communication about how AI systems work and their limitations. The study suggests several strategic approaches to enhance the adoption and integration of AI in healthcare. These include targeted training programs for healthcare professionals to increase familiarity with AI technologies, reduce perceived risks, and build trust. Ensuring transparency and conducting rigorous testing are also vital to foster trust and reliability. Moreover, comprehensive policy frameworks are needed to guide the implementation of AI technologies, ensuring high standards of patient safety, privacy, and ethical use. These measures are crucial for fostering broader acceptance of AI in healthcare, as the study contributes to enriching the discourse on AI's role by detailing how various factors affect its adoption and impact.

Keywords: ChatGPT, healthcare, survey study, IT adoption, behaviour, applcation, concerns

Procedia PDF Downloads 11
12837 How Whatsappization of the Chatbot Affects User Satisfaction, Trust, and Acceptance in a Drive-Sharing Task

Authors: Nirit Gavish, Rotem Halutz, Liad Neta

Abstract:

Nowadays, chatbots are gaining more and more attention due to the advent of large language models. One of the important considerations in chatbot design is how to create an interface to achieve high user satisfaction, trust, and acceptance. Since WhatsApp conversations sometimes substitute for face-to-face communication, we studied whether WhatsAppization of the chatbot -making the conversation resemble a WhatsApp conversation more- will improve user satisfaction, trust, and acceptance, or whether the opposite will occur due to the Uncanny Valley (UV) effect. The task was a drive-sharing task, in which participants communicated with a textual chatbot via WhatsApp and could decide whether to participate in a ride to college with a driver suggested by the chatbot. WhatsAppization of the chatbot was done in two ways: By a dialog-style conversation (Dialog versus No Dialog), and by adding WhatsApp indicators – “Last Seen”, “Connected”, “Read Receipts”, and “Typing…” (Indicators versus No Indicators). Our 120 participants were randomly assigned to one of the four 2 by 2 design groups, with 30 participants in each. They interacted with the WhatsApp chatbot and then filled out a questionnaire. The results demonstrated that, as expected from the manipulation, the interaction with the chatbot was longer for the dialog condition compared to the no dialog. This extra interaction, however, did not lead to higher acceptance -quite the opposite, since participants in the dialog condition were less willing to implement the decision made at the end of the conversation with the chatbot and continue the interaction with the driver they chose. The results are even more striking when considering the Indicators condition. Both for the satisfaction measures and the trust measures, participants’ ratings were lower in the Indicators condition compared to the No Indicators. Participants in the Indicators condition felt that the ride search process was harder to operate, and slower (even though the actual interaction time was similar). They were less convinced that the chatbot suggested real trips and they trusted the person offering the ride and referred to them by the chatbot less. These effects were more evident for participants who preferred to share their rides using WhatsApp compared to participants who preferred chatbots for that purpose. Considering our findings, we can say that the WhatsAppization of the chatbot was detrimental. This is true for the both chatbot WhatsAppization methods – by making the conversation more a dialog and adding WhatsApp indicators. For the chosen drive-sharing task, the results were, in addition to lower satisfaction, less trust in the chatbot’s suggestion and even in the driver suggested by the chatbot, and lower willingness to actually undertake the suggested ride. In addition, it seems that the most problematic WhatsAppization method was using WhatsApp’s indicators during the interaction with the chatbot. The current study suggests that a conversation with an artificial agent should also not imitate a WhatsApp conversation very closely. With the proliferation of WhatsApp use, the emotional and social aspect of face-to face commination are moving to WhatsApp communication. Based on the current study’s findings, it is possible that the UV effect also occurs in WhatsAppization, and not only in humanization, of the chatbot, with a similar feeling of eeriness, and is more pronounced for people who prefer to use WhatsApp over chatbots. The current research can serve as a starting point to study the very interesting and important topic of chatbots WhatsAppization. More methods of WhatsAppization and other tasks could be the focus of further studies.

Keywords: chatbot, WhatsApp, humanization, Uncanny Valley, drive sharing

Procedia PDF Downloads 27
12836 Older Consumer’s Willingness to Trust Social Media Advertising: An Australian Case

Authors: Simon J. Wilde, David M. Herold, Michael J. Bryant

Abstract:

Social media networks have become the hotbed for advertising activities, due mainly to their increasing consumer/user base, and secondly, owing to the ability of marketers to accurately measure ad exposure and consumer-based insights on such networks. More than half of the world’s population (4.8 billion) now uses social media (60%), with 150 million new users having come online within the last 12 months (to June 2022). As the use of social media networks by users grows, key business strategies used for interacting with these potential customers have matured, especially social media advertising. Unlike other traditional media outlets, social media advertising is highly interactive and digital channel-specific. Social media advertisements are clearly targetable, providing marketers with an extremely powerful marketing tool. Yet despite the measurable benefits afforded to businesses engaged in social media advertising, recent controversies (such as the relationship between Facebook and Cambridge Analytica in 2018) have only heightened the role trust and privacy play within these social media networks. The purpose of this exploratory paper is to investigate the extent to which social media users trust social media advertising. Understanding this relationship will fundamentally assist marketers in better understanding social media interactions and their implications for society. Using a web-based quantitative survey instrument, survey participants were recruited via a reputable online panel survey site. Respondents to the survey represented social media users from all states and territories within Australia. Completed responses were received from a total of 258 social media users. Survey respondents represented all core age demographic groupings, including Gen Z/Millennials (18-45 years = 60.5% of respondents) and Gen X/Boomers (46-66+ years = 39.5% of respondents). An adapted ADTRUST scale, using a 20 item 7-point Likert scale, measured trust in social media advertising. The ADTRUST scale has been shown to be a valid measure of trust in advertising within traditional different media, such as broadcast media and print media, and more recently, the Internet (as a broader platform). The adapted scale was validated through exploratory factor analysis (EFA), resulting in a three-factor solution. These three factors were named reliability, usefulness and affect, and the willingness to rely on. Factor scores (weighted measures) were then calculated for these factors. Factor scores are estimates of the scores survey participants would have received on each of the factors had they been measured directly, with the following results recorded (Reliability = 4.68/7; Usefulness and Affect = 4.53/7; and Willingness to Rely On = 3.94/7). Further statistical analysis (independent samples t-test) determined the difference in factor scores between the factors when age (Gen Z/Millennials vs. Gen X/Boomers) was utilised as the independent, categorical variable. The results showed the difference in mean scores across all three factors to be statistically significant (p<0.05) for these two core age groupings: Gen Z/Millennials Reliability = 4.90/7 vs Gen X/Boomers Reliability = 4.34/7; Gen Z/Millennials Usefulness and Affect = 4.85/7 vs Gen X/Boomers Usefulness and Affect = 4.05/7; and Gen Z/Millennials Willingness to Rely On = 4.53/7 vs Gen X/Boomers Willingness to Rely On = 3.03/7. The results clearly indicate that older social media users lack trust in the quality of information conveyed in social media ads, when compared to younger, more social media-savvy consumers. This is especially evident with respect to Factor 3 (Willingness to Rely On), whose underlying variables reflect one’s behavioural intent to act based on the information conveyed in advertising. These findings can be useful to marketers, advertisers, and brand managers in that the results highlight a critical need to design ‘authentic’ advertisements on social media sites to better connect with these older users, in an attempt to foster positive behavioural responses from within this large demographic group – whose engagement with social media sites continues to increase year on year.

Keywords: social media advertising, trust, older consumers, online

Procedia PDF Downloads 68
12835 Demand for Index Based Micro-Insurance (IBMI) in Ethiopia

Authors: Ashenafi Sileshi Etefa, Bezawit Worku Yenealem

Abstract:

Micro-insurance is a relatively new concept that is just being introduced in Ethiopia. For an agrarian economy dominated by small holder farming and vulnerable to natural disasters, mainly drought, the need for an Index-Based Micro Insurance (IBMI) is crucial. Since IBMI solves moral hazard, adverse selection, and access issues to poor clients, it is preferable over traditional insurance products. IBMI is being piloted in drought prone areas of Ethiopia with the aim of learning and expanding the service across the country. This article analyses the demand of IBMI and the barriers to demand and finds that the demand for IBMI has so far been constrained by lack of awareness, trust issues, costliness, and the level of basis risk; and recommends reducing the basis risk and increasing the role of government and farmer cooperatives.

Keywords: agriculture, index based micro-insurance (IBMI), drought, micro-finance institution (MFI)

Procedia PDF Downloads 274
12834 Analysis and Design Modeling for Next Generation Network Intrusion Detection and Prevention System

Authors: Nareshkumar Harale, B. B. Meshram

Abstract:

The continued exponential growth of successful cyber intrusions against today’s businesses has made it abundantly clear that traditional perimeter security measures are no longer adequate and effective. We evolved the network trust architecture from trust-untrust to Zero-Trust, With Zero Trust, essential security capabilities are deployed in a way that provides policy enforcement and protection for all users, devices, applications, data resources, and the communications traffic between them, regardless of their location. Information exchange over the Internet, in spite of inclusion of advanced security controls, is always under innovative, inventive and prone to cyberattacks. TCP/IP protocol stack, the adapted standard for communication over network, suffers from inherent design vulnerabilities such as communication and session management protocols, routing protocols and security protocols are the major cause of major attacks. With the explosion of cyber security threats, such as viruses, worms, rootkits, malwares, Denial of Service attacks, accomplishing efficient and effective intrusion detection and prevention is become crucial and challenging too. In this paper, we propose a design and analysis model for next generation network intrusion detection and protection system as part of layered security strategy. The proposed system design provides intrusion detection for wide range of attacks with layered architecture and framework. The proposed network intrusion classification framework deals with cyberattacks on standard TCP/IP protocol, routing protocols and security protocols. It thereby forms the basis for detection of attack classes and applies signature based matching for known cyberattacks and data mining based machine learning approaches for unknown cyberattacks. Our proposed implemented software can effectively detect attacks even when malicious connections are hidden within normal events. The unsupervised learning algorithm applied to network audit data trails results in unknown intrusion detection. Association rule mining algorithms generate new rules from collected audit trail data resulting in increased intrusion prevention though integrated firewall systems. Intrusion response mechanisms can be initiated in real-time thereby minimizing the impact of network intrusions. Finally, we have shown that our approach can be validated and how the analysis results can be used for detecting and protection from the new network anomalies.

Keywords: network intrusion detection, network intrusion prevention, association rule mining, system analysis and design

Procedia PDF Downloads 215
12833 A Systematic Review of Street-Level Policy Entrepreneurship Strategies in Different Political Contexts

Authors: Hui Wang, Huan Zhang

Abstract:

This study uses systematic review and qualitative comparative analysis methods to comprehensively inquire about the recent street-level policy entrepreneurship research, to identify the characteristics and lessons we can learn from 20 years of street-level policy entrepreneurship literature, and the relations between political contexts and street-level policy entrepreneurs’ strategies. Using data from a systematic review of street-level policy entrepreneurship literature, we identify the sub-components of different political contexts and core strategies of street-level policy entrepreneurs and estimate the configurational relations between different political settings and street-level policy entrepreneurs’ strategies. Our results show that street-level policy entrepreneurs display social acuity, define the problem, and build team strategies when policy or political streams dominate. Street-level policy entrepreneurs will use lead-by-example strategies when both policy and political streams dominate. Furthermore, street-level policy entrepreneurs will use bureaucratic strategies, even if no stream dominates in the political context.

Keywords: policy entrepreneurs, qualitative comparative analysis, street-level bureaucracy, systematic review

Procedia PDF Downloads 87
12832 Measurement of Susceptibility Users Using Email Phishing Attack

Authors: Cindy Sahera, Sarwono Sutikno

Abstract:

Rapid technological developments also have negative impacts, namely the increasing criminal cases based on technology or cybercrime. One technique that can be used to conduct cybercrime attacks are phishing email. The issue is whether the user is aware that email can be misused by others so that it can harm the user's own? This research was conducted to measure the susceptibility of selected targets against email abuse. The objectives of this research are measurement of targets’ susceptibility and find vulnerability in email recipient. There are three steps being taken in this research, (1) the information gathering phase, (2) the design phase, and (3) the execution phase. The first step includes the collection of the information necessary to carry out an attack on a target. The next step is to make the design of an attack against a target. The last step is to send phishing emails to the target. The levels of susceptibility are three: level 1, level 2 and level 3. Level 1 indicates a low level of targets’ susceptibility, level 2 indicates the intermediate level of targets’ susceptibility, and level 3 indicates a high level of targets’ susceptibility. The results showed that users who are on level 1 and level 2 more that level 3, which means the user is not too careless. However, it does not mean the user to be safe. There are still vulnerabilities that may occur, such as automatic location detection when opening emails and automatic downloaded malware as user clicks a link in the email.

Keywords: cybercrime, email phishing, susceptibility, vulnerability

Procedia PDF Downloads 264
12831 A Comparative Analysis of Evacuation Behavior in Case of Cyclone Sidr, Typhoon Yolanda and the Great East Japan Earthquake

Authors: Swarnali Chakma, Akihiko Hokugo

Abstract:

Research on three case studies reviewed here explains many aspects and complications of evacuation behavior during an emergency period. The scenario and phenomenon of the disaster were different, but the similarities are that after receiving the warning peoples does not take it seriously. Many individuals evacuated after taking some kind of action, for example; return to home, searching for family members, prepared valuable things etc. Based on a review of the literature, the data identified a number of factors that help explain evacuation behavior during the disaster. In the case of Japan, cultural inhibitors impact people’s behavior; for example, following the traffic rules, some people lost their time to skip because of the slow-moving car makes overcrowded traffic and some of them were washed away by the tsunami. In terms of Bangladeshi culture, women did not want to evacuate without men because staying men and women who do not know each other under the same roof together is not regular practice or comfortable. From these three case studies, it is observed that early warning plays an important role in cyclones, typhoons and earthquakes. A high level of trust from residents in the warning system is important to real evacuation. It is necessary to raise awareness of disaster and provide information on the vulnerability to cyclones, typhoons and earthquakes hazards at community levels. The local level may help decision makers and other stakeholders to make a better decision regarding an effective disaster management.

Keywords: disaster management, emergency period, evacuation, shelter, typhoon

Procedia PDF Downloads 141
12830 A Cloud-Based Federated Identity Management in Europe

Authors: Jesus Carretero, Mario Vasile, Guillermo Izquierdo, Javier Garcia-Blas

Abstract:

Currently, there is a so called ‘identity crisis’ in cybersecurity caused by the substantial security, privacy and usability shortcomings encountered in existing systems for identity management. Federated Identity Management (FIM) could be solution for this crisis, as it is a method that facilitates management of identity processes and policies among collaborating entities without enforcing a global consistency, that is difficult to achieve when there are ID legacy systems. To cope with this problem, the Connecting Europe Facility (CEF) initiative proposed in 2014 a federated solution in anticipation of the adoption of the Regulation (EU) N°910/2014, the so-called eIDAS Regulation. At present, a network of eIDAS Nodes is being deployed at European level to allow that every citizen recognized by a member state is to be recognized within the trust network at European level, enabling the consumption of services in other member states that, until now were not allowed, or whose concession was tedious. This is a very ambitious approach, since it tends to enable cross-border authentication of Member States citizens without the need to unify the authentication method (eID Scheme) of the member state in question. However, this federation is currently managed by member states and it is initially applied only to citizens and public organizations. The goal of this paper is to present the results of a European Project, named eID@Cloud, that focuses on the integration of eID in 5 cloud platforms belonging to authentication service providers of different EU Member States to act as Service Providers (SP) for private entities. We propose an initiative based on a private eID Scheme both for natural and legal persons. The methodology followed in the eID@Cloud project is that each Identity Provider (IdP) is subscribed to an eIDAS Node Connector, requesting for authentication, that is subscribed to an eIDAS Node Proxy Service, issuing authentication assertions. To cope with high loads, load balancing is supported in the eIDAS Node. The eID@Cloud project is still going on, but we already have some important outcomes. First, we have deployed the federation identity nodes and tested it from the security and performance point of view. The pilot prototype has shown the feasibility of deploying this kind of systems, ensuring good performance due to the replication of the eIDAS nodes and the load balance mechanism. Second, our solution avoids the propagation of identity data out of the native domain of the user or entity being identified, which avoids problems well known in cybersecurity due to network interception, man in the middle attack, etc. Last, but not least, this system allows to connect any country or collectivity easily, providing incremental development of the network and avoiding difficult political negotiations to agree on a single authentication format (which would be a major stopper).

Keywords: cybersecurity, identity federation, trust, user authentication

Procedia PDF Downloads 148
12829 The Factors that Effect to User Satisfaction of Information System in Bangkok Hospital

Authors: Somchai Buaroong

Abstract:

This research attempted to study information system success in dimensions of the user satisfaction level and to find the association between the independent factors of the user experiences, user knowledge, and user attitude. The study sample was selected using simple random sampling that comprised of 190 users who had used the Bangkok HIS. The data were reported from 165 questionnaires. The results found that the user satisfaction was at a moderate level, user satisfaction on the information quality and system quality was at a moderate level, while satisfaction on service quality was at a high level. The computer knowledge of the user was at a moderate level, and the user attitude was at a positive level. The participation of the user was at a low level and the participation in decision and in evaluation was at a low level; however participation in implementation and in benefit was at a moderate.

Keywords: information system success, hospital information system, user attitude, user satisfaction

Procedia PDF Downloads 298
12828 Games behind Bars: A Longitudinal Study of Inmates Pro-Social Preferences

Authors: Mario A. Maggioni, Domenico Rossignoli, Simona Beretta, Sara Balestri

Abstract:

The paper presents the results of a Longitudinal Randomized Control Trial implemented in 2016 two State Prisons in California (USA). The subjects were randomly assigned to a 10-months program (GRIP, Guiding Rage Into Power) aiming at undoing the destructive behavioral patterns that lead to criminal actions by raising the individual’s 'mindfulness'. This study tests whether the participation to this program (treatment), based on strong relationships and mutual help, affects pro-social behavior of participants, in particular with reference to trust and inequality aversion. The research protocol entails the administration of two questionnaires including a set of behavioral situations ('games') - widely used in the relevant literature in the field - to 80 inmates, 42 treated (enrolled in the program) and 38 controls. The first questionnaire has been administered before treatment and randomization took place; the second questionnaire at the end of the program. The results of a Difference-in-Differences estimation procedure, show that trust significantly increases GRIP participants to compared to the control group. The result is robust to alternative estimation techniques and to the inclusion of a set of covariates to further control for idiosyncratic characteristics of the prisoners.

Keywords: behavioral economics, difference in differences, longitudinal study, pro-social preferences

Procedia PDF Downloads 373
12827 Implementing Community Policing in Nigeria: Problems and Prospects

Authors: Mohammed Jamilu Haruna, Kawu Adamu Sule

Abstract:

This paper examines the evolution of modern policing in Nigeria to the present day, with a focus on the newly introduced community policing, which seeks to cement the operational vacuum created by the repressive and oppressive approach of the Nigeria Police Force (NPF), which renders the police incapable of addressing the twin problems of crime and disorder. Thus, the primary purpose for the implementation of community policing was to use it as a mechanism for building the lost trust between the police and the public, perhaps due to the long history of antagonistic and repressive relationships between them. If properly implemented, community policing has the prospect of empowering Nigerian citizens with the skills to protect themselves against invaders of their private security so that crimes can be prevented before anyone is victimized. Other prospects include, but are not limited to, (i) a favorable public view of the police, (ii) building of mutual trust, (iii) increased information flow through effective communication between the police and the public, and above all, (iv) increased police accountability. Unfortunately, problems such as aged suspicious and distrustful relationships, inadequate funding, poor training of officers, poor monitoring and evaluation of the community policing project, lack of public awareness of the benefits of the program, and sabotage by some of the personnel of the police who benefits from the status quo, were some of the reasons that troubled the implementation of community policing.

Keywords: community, policing, problems, prospects, problem solving

Procedia PDF Downloads 49
12826 Drivers for Relationship Building in the Supply Chain: The Case of Luxury Food

Authors: Kateryna Merkulova, Alessio Castello, Maria Kreuzer

Abstract:

This research investigates the drivers of long-term relationship building between customers and suppliers within the luxury food supply chain, a topic that remains largely unexplored in the current state of academic literature. This paper identifies for the first time the key elements that influence the formation and maintenance of effective supply chain relationships, which are crucial for navigating the complexities of the luxury food industry. In particular, it explores the critical role of trust in a business-to-business context, specifically emphasizing its significance in the luxury food supply chain. Empirically, this research is contextualized in the region of the French Riviera, which offers a gastronomic playground for food enthusiasts, making it ideally suited to explore the luxury food sector. Qualitative in-depth interviews with stakeholders along the luxury supply chain (i.e., suppliers, chefs, restaurant owners, and fine food shop managers) allow identifying key drivers of trustful business relationships. Triangulating different perspectives of stakeholders within the luxury supply chain adds validity and robustness to the findings. The findings have important theoretical and managerial implications for the effective functioning of long-term supplier-buyer relationships.

Keywords: luxury food, relationship building, B2B, supply chain, trust

Procedia PDF Downloads 34