Search results for: sense of security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4496

Search results for: sense of security

2156 A Pre-Assessment Questionnaire to Identify Healthcare Professionals’ Perception on Information Technology Implementation

Authors: Y. Atilgan Şengül

Abstract:

Health information technologies promise higher quality, safer care and much more for both patients and professionals. Despite their promise, they are costly to develop and difficult to implement. On the other hand, user acceptance and usage determine the success of implemented information technology in healthcare. This study provides a model to understand health professionals’ perception and expectation of health information technology. Extensive literature review has been conducted to determine the main factors to be measured. A questionnaire has been designed as a measurement model and submitted to the personnel of an in vitro fertilization clinic. The respondents’ degree of agreement according to five-point Likert scale was 72% for convenient access to data and 69.4% for the importance of data security. There was a significant difference in acceptance of electronic data storage for female respondents. Also, other significant differences between professions were obtained.

Keywords: healthcare, health informatics, medical record system, questionnaire

Procedia PDF Downloads 176
2155 Human Rights Impact on Citizens Evolution

Authors: Joseph Marzouk Gerais Abdelmalak

Abstract:

The interface between development and human rights has long been the subject of academic debate. Therefore, to understand the dynamics between the two concepts, a number of principles have been adopted, ranging from the right to development to a human rights-based approach to development. Despite these attempts, the exact connection between development and human rights is not yet fully understood. However, the inherent interdependence between these two concepts and the idea that development efforts should be undertaken with respect for human rights guarantees have gained momentum in recent years. It will then be examined whether the right to sustainable development is recognized.The article therefore concludes that the principles of sustainable development are recognized, directly or indirectly, in various human rights instruments, which represents a positive answer to the question posed above. Therefore, this work discusses international and regional human rights instruments as well as case law and interpretative guidelines from human rights bodies to demonstrate this hypothesis.

Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security

Procedia PDF Downloads 78
2154 Determining of Importance Level of Factors Affecting Job Selection with the Method of AHP

Authors: Nurullah Ekmekci, Ömer Akkaya, Kazım Karaboğa, Mahmut Tekin

Abstract:

Job selection is one of the most important decisions that affect their lives in the name of being more useful to themselves and the society. There are many criteria to consider in the job selection. The amount of criteria in the job selection makes it a multi-criteria decision-making (MCDM) problem. In this study; job selection has been discussed as multi-criteria decision-making problem and has been solved by Analytic Hierarchy Process (AHP), one of the multi-criteria decision making methods. A survey, contains 5 different job selection criteria (finding a job friendliness, salary status, job , social security, work in the community deems reputation and business of the degree of difficulty) within many job selection criteria and 4 different job alternative (being academician, working at the civil service, working at the private sector and working at in their own business), has been conducted to the students of Selcuk University Faculty of Economics and Administrative Sciences. As a result of pairwise comparisons, the highest weighted criteria in the job selection and the most coveted job preferences were identified.

Keywords: analytical hierarchy process, job selection, multi-criteria, decision making

Procedia PDF Downloads 405
2153 A Framework for Protecting Teenagers from Cyber Crimes and Cyberbullying

Authors: Sultan Alanazi, Adwan Alanazi

Abstract:

Social applications consist of powerful tools that allow people to connect and interact with each other. However, its negative use cannot be ignored. Cyberbullying is a new and serious Internet problem. Cyberbullying is one of the most common risks for teenagers to go online. More than half of young people report that they do not tell their parents when this will occur, which can have significant physiological consequences. Cyberbullying involves the deliberate use of digital media on the Internet to convey false or embarrassing information about others. Therefore, this article provides a way to detect cyber-bullying in social media applications for parents. The purpose of our work is to develop an architectural model for identifying and measuring the state of Cyberbullying faced by children on social media applications. For parents, this will be a good tool for monitoring their children without invading their privacy. Finally, some interesting open-ended questions were raised, suggesting promising ideas for starting new research in this new field.

Keywords: cyberbullying, cyber bullying, internet crimes, social media security, E-crimes

Procedia PDF Downloads 144
2152 The Relevance of Bioinspired Architecture and Programmable Materials for Development of 4D Printing

Authors: Daniela Ribeiro, Silvia Lenyra Meirelles Campos Titotto

Abstract:

Nature has long served as inspiration for humans, since various technologies present in society are a mirror of the natural world. This is due to the fact that nature has adapted for millions of years to possess the characteristics they have today. In this sense, man takes advantage of this situation and uses it to produce his own objects and solve his problems. This concept, which is known as biomimetics, is something relatively new, once it was only denominated in 1957. Nature, in turn, responds directly and consistently to environmental conditions. For example, plants that have touch sensitivity contract with this stimulus. Such a situation resembles a technology that has been gaining ground in the contemporary world of scientific innovation: 4D printing. 4D printing technology emerged in 2012 as a complement to 3D printing and presents numerous benefits since it provides a deficiency in the second kind of printing mentioned. This type of technology reaches several areas, since it is capable of producing materials that change over time, be it in its composition, form or properties and is such a characteristic that determines the additional dimension of the material. Precisely because of these factors, this type of impression resembles nature and is related to biomimetics. However, only certain types of ‘intelligent’ materials are generally employed in this type of impression, since only they will respond well to such stimuli, one of which is the hydrogel. The hydrogel is a biocompatible polymer that presents several applications, these in turn will be briefly mentioned in this article to exemplify its importance and the reason for choosing this material as object of study. In addition, aspects that configure 4D printing will be treated here, such as the importance of architecture, programming language and the reversibility of printed materials.

Keywords: 4D printing, biomimetic, hydrogel, materials

Procedia PDF Downloads 171
2151 Political Determinants of Sovereign Spread: The Great East-West Divide

Authors: Maruska Vizek, Josip Glaurdic, Marina Tkalec, Goran Vuksic

Abstract:

We empirically explore whether and how taxation affects bilateral real exchange rates in the euro area – relative unit labor costs and relative consumer price indices. We find that employers’ social security contributions and the value added tax changes have the expected effects put forward in the fiscal devaluation literature and simulations. Increases in employers’ contributions appreciate the relative unit labor costs in the short- and the long-run, while value added tax hike appreciates the relative consumer prices. Somewhat surprisingly, for personal income tax increases, we find a short-run depreciating impact on the relative unit labor costs, while increases in employees’ contributions depreciate both measures of real exchange rates in the short-run.

Keywords: sovereign bonds, European Union, developing countries, political determinants

Procedia PDF Downloads 314
2150 The Impact of Artificial Intelligence on Human Rights Legislations and Evolution

Authors: Shenouda Farag Aziz Ibrahim

Abstract:

The relationship between terrorism and human rights has become an important issue in the fight against terrorism worldwide. This is based on the fact that terrorism and human rights are closely linked, so that when the former begins, the latter suffers. This direct link was recognized in the Vienna Declaration and Program of Action adopted by the International Conference on Human Rights held in Vienna on 25 June 1993, which recognized that terrorist acts aim to violate human rights in all their forms and manifestations. . Therefore, terrorism represents an attack on fundamental human rights. For this purpose, the first part of this article focuses on the relationship between terrorism and human rights and aims to show the relationship between these two concepts. In the second part, the concept of cyber threat and its manifestations are discussed. An analysis of the fight against terrorism in the context of human rights was also made..

Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security.

Procedia PDF Downloads 49
2149 Sustainable Agriculture in Nigeria: Integrating Energy Efficiency and Renewables

Authors: Vicx Farm

Abstract:

This paper examines the critical role of energy efficiency management and renewable energy in fostering sustainable agricultural practices in Nigeria. With the growing concerns over energy security, environmental degradation, and climate change, there is an urgent need to transition towards more sustainable energy sources and practices in the agricultural sector. Nigeria, being a significant player in the global agricultural market, stands to benefit immensely from integrating energy efficiency measures and renewable energy solutions into its agricultural activities. This paper discusses the current energy challenges facing Nigerian agriculture, explores the potential benefits of energy efficiency and renewable energy adoption, and proposes strategies for effective implementation. The paper concludes with recommendations for policymakers, stakeholders, and practitioners to accelerate the adoption of energy-efficient and renewable energy technologies in Nigerian agriculture, thereby promoting sustainable development and resilience in the sector.

Keywords: energy, agriculture, sustainability, power

Procedia PDF Downloads 80
2148 Big Data in Construction Project Management: The Colombian Northeast Case

Authors: Sergio Zabala-Vargas, Miguel Jiménez-Barrera, Luz VArgas-Sánchez

Abstract:

In recent years, information related to project management in organizations has been increasing exponentially. Performance data, management statistics, indicator results have forced the collection, analysis, traceability, and dissemination of project managers to be essential. In this sense, there are current trends to facilitate efficient decision-making in emerging technology projects, such as: Machine Learning, Data Analytics, Data Mining, and Big Data. The latter is the most interesting in this project. This research is part of the thematic line Construction methods and project management. Many authors present the relevance that the use of emerging technologies, such as Big Data, has taken in recent years in project management in the construction sector. The main focus is the optimization of time, scope, budget, and in general mitigating risks. This research was developed in the northeastern region of Colombia-South America. The first phase was aimed at diagnosing the use of emerging technologies (Big-Data) in the construction sector. In Colombia, the construction sector represents more than 50% of the productive system, and more than 2 million people participate in this economic segment. The quantitative approach was used. A survey was applied to a sample of 91 companies in the construction sector. Preliminary results indicate that the use of Big Data and other emerging technologies is very low and also that there is interest in modernizing project management. There is evidence of a correlation between the interest in using new data management technologies and the incorporation of Building Information Modeling BIM. The next phase of the research will allow the generation of guidelines and strategies for the incorporation of technological tools in the construction sector in Colombia.

Keywords: big data, building information modeling, tecnology, project manamegent

Procedia PDF Downloads 133
2147 Being Funny is a Serious Business for Feminine Brands

Authors: Mohammed Murtuza Soofi

Abstract:

Purpose: Marketers and Researchers alike have simultaneously, yet in mutually exclusive instances, promote the use of humour by brands in their communication and gendering of brands, as both enhance brand equity and can generate positive attitudinal responses from customers. However, the gendering of brands comes with associated gendered stereotypical expectations. The current paper consolidates the long standing literature on gender role/stereotype theory and brand gender theories establishing a theoretical framework for understanding how gender-based stereotypes about humour can influence consumers’ attitudinal responses towards brands. Design/methodology/approach: Using parallel constrain satisfaction theory as domain theory to explain the highhandedness of stereotypes and gender stereotype theories (particularly around feminine use of humour), we explain why gender based stereotypes could constrain brand behaviors, and in turn, feminine brands get penalised for using witty, aggressive and self-enhancing humor. Findings: Extension of gender stereotypes to anthropomorphised brands will lead consumers to judge the use of negative humour by a feminine brand as less appropriate, which will trigger the causal chain of reduced sense of communal appropriateness and brand warmth which will result in a negative attitude towards the brand. Originality/value: Brand gendering being susceptible to gender based stereotypes, has very little attention in the literature and hence use of negative humour (stereotypical male behaviour), has never been studied in the context of gendered brands. It also helps understand to what extent stereotypes will impact attitudinal responses to the brand. Our work can help understand when heavily gendered brands can optimise the use of humour and when they can avoid it.

Keywords: brand femininity, brand gender, gender stereotypes, humour

Procedia PDF Downloads 206
2146 Elderly Care for Bereaved Parents Following the Death of an Only Child in Mainland China

Authors: Chao Fang

Abstract:

Due to the Confucian emphasis on filial piety and an undeveloped social welfare system in mainland China, adult children are both socially and legally obliged to care for their parents, including financial assistance and physical care as well as emotional and social support. Thus a family-centred care pattern for elderly people has been firmly established in China. However, because of the nationwide ‘One Child Policy’, over one million parents are excluded from such care because of the death of their only child and, therefore, their primary caregiver. Without their child’s support, these parents must manage the day to day challenges of growing old alone, with little support from society. By overturning established expectations of a ‘good’ elderly life, the loss of an only child may be accompanied by social and self-stigmatization, pushing these bereaved parents to the margin of society and threatening their economic, physical, emotional and social well-being. More importantly, since the One Child Policy was implemented from the late 1970s and early 1980s, the first generation of bereaved or ‘Shidu’ parents has reached an age at which those parents need elderly care. However, their predicament has been largely ignored. This paper reports on a qualitative interview study that found elderly care to be the main concern for Shidu parents’ everyday life. The paper identifies and discusses the concerns these bereaved parents raised about the prospect of having nowhere to turn at a time of increased need for financial, physical, social and emotional support in old age. The paper also identifies how Shidu parents have been coming together in grief and negotiate to make their predicament known to the government and wider society and to re-define their elderly life by rebuilding a sense of ‘family’.

Keywords: culture, bereavement, China, elderly care

Procedia PDF Downloads 276
2145 A Secure Routing Algorithm for ‎Underwater Wireless Sensor Networks

Authors: Seyed Mahdi Jameii

Abstract:

Underwater wireless sensor networks have been attracting the interest of many ‎researchers lately, and the past three decades have beheld the rapid progress of ‎underwater acoustic communication. One of the major problems in underwater wireless ‎sensor networks is how to transfer data from the moving node to the base stations and ‎choose the optimized route for data transmission. Secure routing in underwater ‎wireless sensor network (UWCNs) is necessary for packet delivery. Some routing ‎protocols are proposed for underwater wireless sensor networks. However, a few ‎researches have been done on secure routing in underwater sensor networks. In this ‎article, a secure routing protocol is provided to resist against wormhole and sybil ‎attacks. The results indicated acceptable performance in terms of increasing the packet ‎delivery ratio with regards to the attacks, increasing network lifetime by creating ‎balance in the network energy consumption, high detection rates against the attacks, ‎and low-end to end delay.‎

Keywords: attacks, routing, security, underwater wireless sensor networks

Procedia PDF Downloads 422
2144 Autonomic Threat Avoidance and Self-Healing in Database Management System

Authors: Wajahat Munir, Muhammad Haseeb, Adeel Anjum, Basit Raza, Ahmad Kamran Malik

Abstract:

Databases are the key components of the software systems. Due to the exponential growth of data, it is the concern that the data should be accurate and available. The data in databases is vulnerable to internal and external threats, especially when it contains sensitive data like medical or military applications. Whenever the data is changed by malicious intent, data analysis result may lead to disastrous decisions. Autonomic self-healing is molded toward computer system after inspiring from the autonomic system of human body. In order to guarantee the accuracy and availability of data, we propose a technique which on a priority basis, tries to avoid any malicious transaction from execution and in case a malicious transaction affects the system, it heals the system in an isolated mode in such a way that the availability of system would not be compromised. Using this autonomic system, the management cost and time of DBAs can be minimized. In the end, we test our model and present the findings.

Keywords: autonomic computing, self-healing, threat avoidance, security

Procedia PDF Downloads 508
2143 Using Multi-Level Analysis to Identify Future Trends in Small Device Digital Communication Examinations

Authors: Mark A. Spooner

Abstract:

The growth of technological advances in the digital communications industry has dictated the way forensic examination laboratories receive, analyze, and report on digital evidence. This study looks at the trends in a medium sized digital forensics lab that examines small communications devices (i.e., cellular telephones, tablets, thumb drives, etc.) over the past five years. As law enforcement and homeland security organizations budgets shrink, many agencies are being asked to perform more examinations with less resources available. Using multi-level statistical analysis using five years of examination data, this research shows the increasing technological demand trend. The research then extrapolates the current data into the model created and finds a continued exponential growth curve of said demands is well within the parameters defined earlier on in the research.

Keywords: digital forensics, forensic examination, small device, trends

Procedia PDF Downloads 203
2142 The Role of Attachment and Dyadic Coping in Shaping Relational Intimacy

Authors: Anna Wendolowska, Dorota Czyzowska

Abstract:

An intimate relationship is a significant factor that influences romantic partners’ well-being. In the face of stress, avoidant partners often employ a defense-against-intimacy strategy, leading to reduced relationship satisfaction, intimacy, interdependence, and longevity. Dyadic coping can buffer the negative effects of stress on relational satisfaction. Emotional competence mediates the relationship between insecure attachment and intimacy. In the current study, the link between attachment, different forms of dyadic coping, and various aspects of relationship satisfaction was examined. Both partners completed the attachment style questionnaire, the well matching couple questionnaire, and the dyadic coping inventory. The data was analyzed using the actor–partner interdependence model. The results highlighted a negative association between insecure-avoidant attachment style and intimacy. The actor effects of avoidant attachment on relational intimacy for women and for men were significant, whilst the partner effects for both spouses were not significant. The emotion-focused common dyadic coping moderated the relationship between avoidance of attachment and the partner's sense of intimacy. After controlling for the emotion-focused common dyadic coping, the actor effect of attachment on intimacy for men was slightly weaker, and the actor effect for women turned out to be insignificant. The emotion-focused common dyadic coping weakened the negative association between insecure attachment and relational intimacy. The impact of adult attachment and dyadic coping significantly contributes to subjective relational well-being.

Keywords: adult attachment, dyadic coping, relational intimacy, relationship satisfaction

Procedia PDF Downloads 166
2141 Conceptualizing Thoughtful Intelligence for Sustainable Decision Making

Authors: Musarrat Jabeen

Abstract:

Thoughtful intelligence offers a sustainable position to enhance the influence of decision-makers. Thoughtful Intelligence implies the understanding to realize the impact of one’s thoughts, words and actions on the survival, dignity and development of the individuals, groups and nations. Thoughtful intelligence has received minimal consideration in the area of Decision Support Systems, with an end goal to evaluate the quantity of knowledge and its viability. This pattern degraded the imbibed contribution of thoughtful intelligence required for sustainable decision making. Given the concern, this paper concentrates on the question: How to present a model of Thoughtful Decision Support System (TDSS)? The aim of this paper is to appreciate the concepts of thoughtful intelligence and insinuate a Decision Support System based on thoughtful intelligence. Thoughtful intelligence includes three dynamic competencies: i) Realization about long term impacts of decisions that are made in a specific time and space, ii) A great sense of taking actions, iii) Intense interconnectivity with people and nature and; seven associate competencies, of Righteousness, Purposefulness, Understanding, Contemplation, Sincerity, Mindfulness, and Nurturing. The study utilizes two methods: Focused group discussion to count prevailing Decision Support Systems; 70% results of focus group discussions found six decision support systems and the positive inexistence of thoughtful intelligence among decision support systems regarding sustainable decision making. Delphi focused on defining thoughtful intelligence to model (TDSS). 65% results helped to conceptualize (definition and description) of thoughtful intelligence. TDSS is offered here as an addition in the decision making literature. The clients are top leaders.

Keywords: thoughtful intelligence, sustainable decision making, thoughtful decision support system

Procedia PDF Downloads 139
2140 The Influence of Brands in E-Sports Spectators

Authors: Rene Kasper, Hyago Ribeiro, Marcelo Curth

Abstract:

Electronic sports, or just e-sports, boast an exponential growth in the interest of the public and large investors. The e-sports teams are equal to classic sports teams, like football, since in their structure they have, besides the athletes, administrators, coaches and even doctors. The concept of team games arises with a very strong social interaction, as it is perceived that users interact with real peers rather than competing with intelligent software. In this sense, electronic games are established as a sociocultural phenomenon and as multidimensional media. Thus, the research aims to identify the profile of users and the importance of brands in the Brazilian electronic sports scene, as well as the relationship of consumers (called fans) with the products and services that occupy the media spaces of the transmissions of sports championships. The research used descriptive quantitative methodology, applied in different e-sports communities, with 160 respondents. The data collection instrument was a survey containing seven questions, which addressed the profile of the participants and their perception on the proposed theme in research. Regarding the profile, the age ranged from 17 to 31 years, of which 93.3% were male and 6.7% female. It was found that 93.3% of the participants had contact with the Brazilian electronic sports scene for at least 2 years, of which 26.7% played between 6 and 12 hours a week and 46.7% played more than 12 hours a week. In addition, it was noticed that income was not a deciding factor to enjoy electronic sports games, because the percentage distribution of participants ranged from 1 to 3 minimum wages (33.3%) and greater than 6 salaries (46.7 %). Regarding the brands, 85.6% emphasized that brands should support the scenario through sponsorship and publicity and 28.6% are attracted to consume brands that advertise in e-sports championships.

Keywords: brands, consumer behavior, e-sports, virtual games

Procedia PDF Downloads 278
2139 Zero-Knowledge Proof-of-Reserve: A Confidential Approach to Cryptocurrency Asset Verification

Authors: Sam Ng, Lewis Leighton, Sam Atkinson, Carson Yan, Landan Hu, Leslie Cheung, Brian Yap, Kent Lung, Ketat Sarakune

Abstract:

This paper introduces a method for verifying cryptocurrency reserves that balances the need for both transparency and data confidentiality. Our methodology employs cryptographic techniques, including Merkle Trees, Bulletproof, and zkSnark, to verify that total assets equal or exceed total liabilities, represented by customer funds. Importantly, this verification is achieved without disclosing sensitive information such as the total asset value, customer count, or cold wallet addresses. We delve into the construction and implementation of this methodology. While the system is robust and scalable, we also identify areas for potential enhancements to improve its efficiency and versatility. As the digital asset landscape continues to evolve, our approach provides a solid foundation for ensuring continued trust and security in digital asset platforms.

Keywords: cryptocurrency, crypto-currency, proof-of-reserve, por, zero-knowledge, ZKP

Procedia PDF Downloads 76
2138 Understanding the Safety Impacts of Imbalances in Truck Parking Supply and Demand

Authors: Rahil Saeedi

Abstract:

The imbalance in truck parking supply and demand can create important safety issues for truck drivers and the public. Research has shown that breaks at specific intervals can increase drivers’ alertness by reducing the monotony of the task. However, if fatigued truck drivers are unable to find a safe parking spot for rest, they may continue to drive or choose to park at remote and insecure areas or undesignated locations. All of these situations pose serious safety and security risks to truck drivers and other roadway users. This study uses 5-year truck crash data in Ohio to develop and test a framework for identifying crashes that happen as a result of imbalances in truck parking supply and demand. The societal impacts of these crashes are then interpreted as monetary values, calculated using the costs associated with various crash severity levels.

Keywords: truck parking, road safety, crash data, geofencing, driver fatigue, undesignated parking

Procedia PDF Downloads 169
2137 Obtaining Bioactive Mg-hydroxyapatite Composite Ceramics From Phosphate Rock For Medical Applications

Authors: Sara Mercedes Barroso Pinzón, Antonio Javier Sanchéz Herencia, Begoña Ferrari, Álvaro Jesús Castro

Abstract:

The current need for durable implants and bone substitutes characterised by biocompatibility, bioactivity and mechanical properties, without immunological rejection, is a major challenge for scientists. Hydroxyapatite (HAp) has been considered for decades as an ideal biomaterial for bone regeneration due to its chemical and crystallographic similarity to the mineral structure bioapatites. However, the lack of trace elements in the hydroxyapatite structure gives it very low mechanical and biological properties. In this sense, the objective of the research is to address the synthesis of hydroxyapatite with Mg from phosphate rock from sedimentary deposits in the central-eastern region of Colombia, taking advantage of the release of the species contained as natural precursors of Ca, P and Mg. The minerals present were studied, fluorapatite as the mineral of interest associated with mineralogical species of magnesium carbonates and quartz. The chemical and mineralogical composition was determined by X-ray fluorescence (XRF) and X-ray diffraction (XRD), scanning electron microscopy (SEM) and energy dispersive X-ray spectroscopy (EDX); as well as the evaluation of the surface physicochemical properties of zeta potential (PZC), with the aim of studying the surface behaviour of the microconstituents present in the phosphate rock and to elucidate the synergistic mechanism between the minerals and establish the optimum conditions for the wet concentration process. From the products obtained and characterised by XRD, XRF, SEM, FTIR, RAMAN, HAp-Mg biocomposite scaffolds are fabricated and the influence of Mg on the morphometric parameters, mechanical and biological properties of the designed materials is evaluated.

Keywords: phosphate rock, hydroxyapatite, magnesium, biomaterials

Procedia PDF Downloads 53
2136 The Web Site Development for E-Commerce Trading in Thailand Customers View

Authors: Ladaporn Pithuk

Abstract:

The purposes of the study were to ascertain the customer requirement, to identify the factors related to online business in Thailand. The sample of this study consisted of 400 customers who are purchasing product and service on E-commerce. To get primary sources, a questionnaire consisting of 31 questions was designed and adapted from previous studies. The data from the questionnaires were collected and analyzed in descriptive forms and (ONE-WAY ANOVA) was conducted. The majority of the respondents showed customer requirement by stating “moderately agree” for questions asking them about customization, connection, content, commerce, context, communication and community, however, they also displayed negative attitudes by identifying “moderately disagree” for security concerns and after-sales services. These important issues need to be improved immediately since it can encourage customers to buy goods and services through the Internet or discourage them, and businesses should offer more channels of payment methods for customers for instance, e-payment.

Keywords: customer requirement, customization, connection, online business

Procedia PDF Downloads 203
2135 When Religion is Meaningful and When Religion is Detrimental

Authors: Tennyson Samraj

Abstract:

The intent of this paper is threefold: (1) to propose the Epicurean tenet that beliefs associated with God are to be detached from the transcendent God, as the basis to end religious conflicts; (2) to project John Hick’s advice that no one has monopoly over religious claims, as the basis for religious tolerance and (3) to present the common sense approach to respect religion without disrespecting science. Religious claims create societal tension on two matters: conflict between believers and conflict with the sciences. Anyone interested in the two fundamental questions related to consciousness and cosmology as to how and why the universe exists will have to deal with science and religion. However, while science addresses the question of how the universe came into existence and how it works, religion addresses the question of why the universe exists. If religion is a quest to understand why the universe exists, then we must address the question as to when religion is considered meaningful and when is it considered detrimental. Is there a relationship between why we choose to live and why the universe exists? Science and Religion are partners in defining our life in the context of the universe. Science without Religion limits itself to knowing ‘how’ the universe came into existence without questioning ‘why’; Religion without Science limits itself of knowing ‘why’ the universe exists without knowing ‘how.’ Is it possible to detach beliefs about God from God? When religious claims are understood in the context of the questions that necessitates the answers, religious claims can be understood as being separate from the transcendent God. This paper purports that this Epicurean tenet provides the impetus to address the questions that necessitate religious claims. This helps us to explain the relevance of why we believe in what we believe; define the relationship between the self, soul and the sacred; and establish the connection between this life and the after-life in the context of life-beyond-this-planet.

Keywords: religion, epicurus, John Hick, relevance of religion

Procedia PDF Downloads 553
2134 'Bemo' (Beras Moringa) as Commodity Innovation Cost of Food Ingredients: In Dealing with Afta Competition

Authors: Isma Alfia Novita

Abstract:

Indonesia is one country with the largest agricultural producer in the world but still can not meet the needs of the national rice. In addition, Indonesia was ranked the second-largest rice importer after the Philippines. Indonesia's rice consumption reached 102 kg per capita, or almost twice the average global rice consumption is only 60 kg per capita per year. One of the government's efforts in developing national food consumption is to invite people to improve diversification and food security. This is done considering the diet of Indonesia is still high consumption of rice. Therefore, this program made innovations Rice Moringa namely imitation rice with the addition of Moringa (Moringa oleifera). Moringa is a plant that is widely grown and easily found. In addition, Moringa has many benefits because it contains vitamin A, vitamin B, vitamin C, calcium, protein, and potassium. Based on the analysis of the nutrient content, it is known that the Moringa leaves have good potential to maintain the balance of nutrients in the body

Keywords: imitation rice, Moringa oliefera, Moringa, AFTA

Procedia PDF Downloads 135
2133 The Impact of Non State Actor’s to Protect Refugees in Kurdistan Region of Iraq

Authors: Rozh Abdulrahman Kareem

Abstract:

The displacement of individuals has become a common interest for international players. Mostly occurs in Islamic states, as religion is considered the most common cause of this form of displacement. Therefore, this thesis aims to depict the reality of the situations of the refugees, particularly in KRI, illustrating how they are treated and protected and if the treatment merits the protection clause as envisaged in the 1951 Refugee Convention. Overall, the aim is to touch on the issue of protection by non-governmental organizations and government towards the refugees here. In light of this, it focused on the adequate protection of refugees in relation to the refugee law. In the Middle East, including Iraq, there have been multiple reports on violations of these refugee laws and human rights. Protection involves providing physical security to the concerned parties, functional administration with legal structures, and infrastructural setup that could help citizens exercise rights. The KRI has provided the refugees with various benefits, including education, access to residency, and employment. It also provided transitionary in various social dimensions like gender-based violence. The Convention on Status of Refugees 1951 tried to resolve this problem, whereby the principle of ‘nonrefoulement’ under Article 33 was passed. The ‘nonrefoulement’, an exceptional reference, was enacted to protect refugees from forcible return to their countries of the original. However, the convention never addressed an unusual scenario regarding the application of this principle, ‘Extradition Treaties.’ Even though some scholarly article exists regarding the problems of refugees, the topic of interplay between Nonrefoulement and Extradition Treaties has never been explained in detail in the available books on refugee laws and practices. Each year, millions of refugees seek protection from foreign countries for fear of being tortured, victimized, or executed. People seeking international protection are susceptible and insecure. The main objective of the prevention is to provide security to citizens susceptible to inhuman treatment, distress, oppression, or other human rights defilements when they arrive back in their own countries. The refugee situation may get worse in the near future. Just like several nations within the Middle East, Iraq is not a signatory to the globally acknowledged legal structure for the protection of refugees. The first law of 1971 in Iraq was issued only for military or political causes. This law also establishes benefits such as the right to education and health services and the right to acquire employment just as the Iraqi nationals. The other legislative instrument is the 21st law from the ministry of migration of Iraq widened the description of an immigrant to incorporate the definition from the refugee resolution. Nonetheless, there is a lack of overall consistency in the protection provided under these legislations regarding rights and entitlement. A Memorandum of Understanding was signed in October 2016 by the UNHCR and the Iraq government to develop the protection of refugees. Under the term of this MoU, the Iraqi Government is obligated to provide identity documents to asylum seekers beside that UNHCR provides more guidance.

Keywords: law, refugee, protection, Kurdistan

Procedia PDF Downloads 67
2132 Present and Future of Micromobility in the City of Medellin

Authors: Saul Emilio Rivero Mejia, Estefanya Marin Tabares, Carlos Andres Rodriguez Toro, Katherine Bolano Restrepo, Sarita Santa Cortes

Abstract:

Medellin is the Colombian city with the best public transportation system in the country, which is composed of two subway lines, five metro cables, two Bus Rapid Transit lines, and a streetcar. But despite the above, the Aburra Valley, the area in which the city is located, comparatively speaking, has a lower number of urban roads per inhabitant built, compared to the national average. In addition, since there is approximately one vehicle for every three inhabitants in Medellin, the problems of congestion and environmental pollution have become more acute over the years, and it has even been necessary to implement restrictive measures to the use of private vehicles on a permanent basis. In that sense, due to the limitations of physical space, the low public investment in road infrastructure, it is necessary to opt for mobility alternatives according to the above. Within the options for the city, there is what is known as micromobility. Micromobility is understood as those small and light means of transport used to travel short distances, which use electrical energy, such as skateboards and bicycles. These transport alternatives have a high potential for use by the city's young population, but this requires an adequate infrastructure and also state regulation. Taking into account the above, this paper will analyze the current state and future of micro mobility in the city of Medellin, making a prospective analysis, supported by a PEST (political, economic, social and technological) analysis. Based on the above, it is expected to identify the growth of demand for these alternative means and its impact on the mobility of the city in the medium and short term.

Keywords: electric, micromobility, transport, sustainable

Procedia PDF Downloads 128
2131 Trust Management for an Authentication System in Ubiquitous Computing

Authors: Malika Yaici, Anis Oussayah, Mohamed Ahmed Takerrabet

Abstract:

Security of context-aware ubiquitous systems is paramount, and authentication plays an important aspect in cloud computing and ubiquitous computing. Trust management has been identified as vital component for establishing and maintaining successful relational exchanges between trading partners in cloud and ubiquitous systems. Establishing trust is the way to build good relationship with both client and provider which positive activates will increase trust level, otherwise destroy trust immediately. We propose a new context-aware authentication system using a trust management system between client and server, and between servers, a trust which induces partnership, thus to a close cooperation between these servers. We defined the rules (algorithms), as well as the formulas to manage and calculate the trusting degrees depending on context, in order to uniquely authenticate a user, thus a single sign-on, and to provide him better services.

Keywords: ubiquitous computing, authentication, context-awareness, trust management

Procedia PDF Downloads 248
2130 The Agency of Black Women Professors in Higher Education: A Critical Consciousness Perspective

Authors: Ncamisile T. Zulu, Nicholas Munro

Abstract:

Black women academics in higher education institutions are predominantly portrayed by literature as individuals who usually lack a sense of belonging, progression, and workload management. The oversaturation of this literature can (overtime) perpetuate a stereotypical idea that Black women academics are incapable of coping and succeeding in higher education institutions. The current article explores the agency, motivated by critical consciousness that Black women professors have and utilise in higher education institutions. In order to provide an understanding of how Black women academics can progress, manage their workloads and succeed in higher education institutions, the article considers how these women can take responsibility for their self-development, adaptation, and self-renewal in academic endeavours. As a result, the article presents a line of thought which could help in challenging the stereotype about Black women academics. The study was conducted at two higher education institutions involving Black women professors from different disciplines. A combination of purposive and snowballing sampling was used to recruit nine women participants, while data were collected through interviews. A critical consciousness perspective was adopted to formulate an understanding of the agency of Black women professors in higher education institutions, while thematic analysis was used to analyse the data. The results challenge the widely disseminated view that portrays Black women academics as incapable of coping and succeeding in higher education institutions. The findings highlight Black women professors as proactive, flexible, and self-regulating in their academic endeavours. These findings contribute to the literature by adding a more constructive narrative of Black women academics in higher education.

Keywords: agency, Black women academics, critical consciousness, higher education institutions

Procedia PDF Downloads 159
2129 Evaluating Electronic Service Quality in Banking Iran

Authors: Vahid Bairami Rad

Abstract:

With the rapid growth of the Internet and the globalization of the market, most enterprises are trying to attract and win customers in the highly competitive electronic market. Better e-service quality will enhance the relationship with customers and their satisfaction. So the measurement of eservice quality is very important but it is a complex process due to the complex nature of services. Literature predicts that there is a lack of universal definition of e-service quality. The e-service quality measures in banking have great importance in achieving high customer base. This paper proposes a conceptual model for measuring e-service quality in Iranian Banking Iran. Nine dimensions reliability, ease of use, personalization, security and trust, website aesthetic, responsiveness, contact and speed of delivery had been identified. The results of this paper may help to develop a proper scale to measure the e-service quality in Iranian Banking Industry, which may assist to maintain and improve the performance and effectiveness of e-service quality to retain customers.

Keywords: electronic banking, Dimensions, customer service quality, electronic, communication

Procedia PDF Downloads 501
2128 Security in Resource Constraints Network Light Weight Encryption for Z-MAC

Authors: Mona Almansoori, Ahmed Mustafa, Ahmad Elshamy

Abstract:

Wireless sensor network was formed by a combination of nodes, systematically it transmitting the data to their base stations, this transmission data can be easily compromised if the limited processing power and the data consistency from these nodes are kept in mind; there is always a discussion to address the secure data transfer or transmission in actual time. This will present a mechanism to securely transmit the data over a chain of sensor nodes without compromising the throughput of the network by utilizing available battery resources available in the sensor node. Our methodology takes many different advantages of Z-MAC protocol for its efficiency, and it provides a unique key by sharing the mechanism using neighbor node MAC address. We present a light weighted data integrity layer which is embedded in the Z-MAC protocol to prove that our protocol performs well than Z-MAC when we introduce the different attack scenarios.

Keywords: hybrid MAC protocol, data integrity, lightweight encryption, neighbor based key sharing, sensor node dataprocessing, Z-MAC

Procedia PDF Downloads 147
2127 Feasibility Study of Wireless Communication for the Control and Monitoring of Rotating Electrical Machine

Authors: S. Ben Brahim, T. H. Vuong, J. David, R. Bouallegue, M. Pietrzak-David

Abstract:

Electrical machine monitoring is important to protect motor from unexpected problems. Today, using wireless communication for electrical machines is interesting for both real time monitoring and diagnostic purposes. In this paper, we propose a system based on wireless communication IEEE 802.11 to control electrical machine. IEEE 802.11 standard is recommended for this type of applications because it provides a faster connection, better range from the base station, and better security. Therefore, our contribution is to study a new technique to control and monitor the rotating electrical machines (motors, generators) using wireless communication. The reliability of radio channel inside rotating electrical machine is also discussed. Then, the communication protocol, software and hardware design used for the proposed system are presented in detail and the experimental results of our system are illustrated.

Keywords: control, DFIM machine, electromagnetic field, EMC, IEEE 802.11, monitoring, rotating electrical machines, wireless communication

Procedia PDF Downloads 699