Search results for: Internet use
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1659

Search results for: Internet use

1449 Customer Relations and Use of Online Shopping Sites

Authors: Bahar Urhan Torun, Havva Nur Tarakcı

Abstract:

At the present time, online marketing has become the common target of small and full-scale organizations. Today’s humanbeing who has to spend most of their time in front of the computer because of his job, prefers to socialize by internet due to the easy access to technology. So online marketing area expands day by day. All business organizations from the smallest to the biggest are in a race in order to get a cut from the virtual market share in an extreme competitive environment. However these organizations which use the internet to reach more consumers cannot determine their target group accurately, so this is the biggest handicap of online marketing sales nowadays. The aim of this study is to determine some significant elements about need for communicating efficiently with the consumer on the internet on online marketing. The strategies that can be used in order to increase sales and the limitations of virtual environment where cannot be communicated with the consumer face to face are argued in this study’s scope. As a consequence it is thought that to study on this subject because of lacking and also being limited efficiency of researches and outputs. Within this scope suggesting some proposals about how to communicate efficiently with the consumer and also offering the consumers’ demands efficiently is the essential objective of this study.

Keywords: online marketing, competition, consumer, communication

Procedia PDF Downloads 268
1448 A Low-Cost Air Quality Monitoring Internet of Things Platform

Authors: Christos Spandonidis, Stefanos Tsantilas, Elias Sedikos, Nektarios Galiatsatos, Fotios Giannopoulos, Panagiotis Papadopoulos, Nikolaos Demagos, Dimitrios Reppas, Christos Giordamlis

Abstract:

In the present paper, a low cost, compact and modular Internet of Things (IoT) platform for air quality monitoring in urban areas is presented. This platform comprises of dedicated low cost, low power hardware and the associated embedded software that enable measurement of particles (PM2.5 and PM10), NO, CO, CO2 and O3 concentration in the air, along with relative temperature and humidity. This integrated platform acts as part of a greater air pollution data collecting wireless network that is able to monitor the air quality in various regions and neighborhoods of an urban area, by providing sensor measurements at a high rate that reaches up to one sample per second. It is therefore suitable for Big Data analysis applications such as air quality forecasts, weather forecasts and traffic prediction. The first real world test for the developed platform took place in Thessaloniki, Greece, where 16 devices were installed in various buildings in the city. In the near future, many more of these devices are going to be installed in the greater Thessaloniki area, giving a detailed air quality map of the city.

Keywords: distributed sensor system, environmental monitoring, Internet of Things, smart cities

Procedia PDF Downloads 146
1447 The Integration of Patient Health Record Generated from Wearable and Internet of Things Devices into Health Information Exchanges

Authors: Dalvin D. Hill, Hector M. Castro Garcia

Abstract:

A growing number of individuals utilize wearable devices on a daily basis. The usage and functionality of these wearable devices vary from user to user. One popular usage of said devices is to track health-related activities that are typically stored on a device’s memory or uploaded to an account in the cloud; based on the current trend, the data accumulated from the wearable device are stored in a standalone location. In many of these cases, this health related datum is not a factor when considering the holistic view of a user’s health lifestyle or record. This health-related data generated from wearable and Internet of Things (IoT) devices can serve as empirical information to a medical provider, as the standalone data can add value to the holistic health record of a patient. This paper proposes a solution to incorporate the data gathered from these wearable and IoT devices, with that a patient’s Personal Health Record (PHR) stored within the confines of a Health Information Exchange (HIE).

Keywords: electronic health record, health information exchanges, internet of things, personal health records, wearable devices, wearables

Procedia PDF Downloads 128
1446 An Internet of Things-Based Weight Monitoring System for Honey

Authors: Zheng-Yan Ruan, Chien-Hao Wang, Hong-Jen Lin, Chien-Peng Huang, Ying-Hao Chen, En-Cheng Yang, Chwan-Lu Tseng, Joe-Air Jiang

Abstract:

Bees play a vital role in pollination. This paper focuses on the weighing process of honey. Honey is usually stored at the comb in a hive. Bee farmers brush bees away from the comb and then collect honey, and the collected honey is weighed afterward. However, such a process brings strong negative influences on bees and even leads to the death of bees. This paper therefore presents an Internet of Things-based weight monitoring system which uses weight sensors to measure the weight of honey and simplifies the whole weighing procedure. To verify the system, the weight measured by the system is compared to the weight of standard weights used for calibration by employing a linear regression model. The R2 of the regression model is 0.9788, which suggests that the weighing system is highly reliable and is able to be applied to obtain actual weight of honey. In the future, the weight data of honey can be used to find the relationship between honey production and different ecological parameters, such as bees’ foraging behavior and weather conditions. It is expected that the findings can serve as critical information for honey production improvement.

Keywords: internet of things, weight, honey, bee

Procedia PDF Downloads 458
1445 An Assessment of the Digital Transformation of Radio

Authors: Fatih Sogut

Abstract:

Developments in information technologies have caused significant changes in terms of radio and television broadcasting. With these changes in terms of production format, transmission techniques and service delivery, the distinction between traditional media and New Media has emerged. The viewer/listener, who was in a passive position before, is now in an active position and has a say in many matters, including content production. Visual and auditory data transfer has diversified and become easier thanks to the convergence phenomenon. These transformations and developments also affected one of the oldest electronic communication tools, radio. In this study, in order to adapt to the new era that emerged with the digital age, the change in radio broadcasting and the factors that led to this change were tried to be explained.

Keywords: Internet, radio broadcasting, digital transformation, Internet broadcasting

Procedia PDF Downloads 170
1444 Cyber Bullying Victimization of Elementary School Students and Their Reflections on the Victimization

Authors: Merve Sadetas Sezer, Ismail Sahin, Ahmet Oguz Akturk

Abstract:

With the use of developing technology, mostly in communication and entertainment, students spend considerable time on the internet. In addition to the advantages provided by the internet, social isolation brings problems such as addiction. This is one of the problems of the virtual violence. Cyber-bullying is the common name of the intensities which students are exposed on the internet. The purpose of this study designed as a qualitative research is to find out the cyber bullying varieties and its effects on elementary school students. The participants of this research are 6th, 7th and 8th grade students of a primary school and 24 students agreed to participate in the study. The students were asked to fill an interview with semi-structured open-ended questions. According to the results obtained in the research, the most important statements determined by the participants are breaking passwords on social networking sites, slang insult to blasphemy and taking friendship offers from unfamiliar people. According to participants from the research, the most used techniques to prevent themselves from cyber bullying are to complain to the site administrator, closing accounts on social networking sites and countercharging. Also, suggestions were presented according to the findings.

Keywords: bullying, cyber-bullying, elementary, peer-relationship, virtual victimization

Procedia PDF Downloads 349
1443 Alternative Key Exchange Algorithm Based on Elliptic Curve Digital Signature Algorithm Certificate and Usage in Applications

Authors: A. Andreasyan, C. Connors

Abstract:

The Elliptic Curve Digital Signature algorithm-based X509v3 certificates are becoming more popular due to their short public and private key sizes. Moreover, these certificates can be stored in Internet of Things (IoT) devices, with limited resources, using less memory and transmitted in network security protocols, such as Internet Key Exchange (IKE), Transport Layer Security (TLS) and Secure Shell (SSH) with less bandwidth. The proposed method gives another advantage, in that it increases the performance of the above-mentioned protocols in terms of key exchange by saving one scalar multiplication operation.

Keywords: cryptography, elliptic curve digital signature algorithm, key exchange, network security protocol

Procedia PDF Downloads 146
1442 Intelligent Rainwater Reuse System for Irrigation

Authors: Maria M. S. Pires, Andre F. X. Gloria, Pedro J. A. Sebastiao

Abstract:

The technological advances in the area of Internet of Things have been creating more and more solutions in the area of agriculture. These solutions are quite important for life, as they lead to the saving of the most precious resource, water, being this need to save water a concern worldwide. The paper proposes the creation of an Internet of Things system based on a network of sensors and interconnected actuators that automatically monitors the quality of the rainwater that is stored inside a tank in order to be used for irrigation. The main objective is to promote sustainability by reusing rainwater for irrigation systems instead of water that is usually available for other functions, such as other productions or even domestic tasks. A mobile application was developed for Android so that the user can control and monitor his system in real time. In the application, it is possible to visualize the data that translate the quality of the water inserted in the tank, as well as perform some actions on the implemented actuators, such as start/stop the irrigation system and pour the water in case of poor water quality. The implemented system translates a simple solution with a high level of efficiency and tests and results obtained within the possible environment.

Keywords: internet of things, irrigation system, wireless sensor and actuator network, ESP32, sustainability, water reuse, water efficiency

Procedia PDF Downloads 149
1441 Internet of Things as a Source of Opportunities for Entrepreneurs

Authors: Svetlana Gudkova

Abstract:

The Internet of Things experiences a rapid growth bringing inevitable changes into many spheres of human activities. As the Internet has changed the social and business landscape, IoT as its extension, can bring much more profound changes in economic value creation and competitiveness of the economies. It has been already recognized as the next industrial revolution. However, the development of IoT is in a great extent stimulated by the entrepreneurial activity. To expand and reach its full potential it requires proactive entrepreneurs, who explore the potential and create innovative ideas pushing the boundaries of IoT technologies' application further. The goal of the research is to analyze, how entrepreneurs utilize the opportunities created by IoT and how do they stimulate the development of IoT through discovering of new ways of generating economic value and creating opportunities, which attract other entrepreneurs. The qualitative research methods have been applied to prepare the case studies. Entrepreneurs are recognized as an engine of economic growth. They introduce innovative products and services into the market through the creation of a new combination of the existing resources and utilizing new knowledge. Entrepreneurs not only create economic value but what is more important, they challenge the existing business models and invent new ways of value creation. Through identification and exploitation of entrepreneurial opportunities, they create new opportunities for other entrepreneurs. It makes the industry more attractive to other profit/innovation-driven start-ups. IoT creates numerous opportunities for entrepreneurs in the different industries. Smart cities, healthcare, manufacturing, retail, agriculture, smart vehicles and smart buildings benefit a lot from IoT-based breakthrough innovations introduced by entrepreneurs. They reinvented successfully the business models and created new entrepreneurial opportunities for other start-ups to introduce next innovations.

Keywords: entrepreneurship, internet of things, breakthrough innovations, start-ups

Procedia PDF Downloads 200
1440 A Study of Issues and Mitigations on Distributed Denial of Service and Medical Internet of Things Devices

Authors: Robin Singh, Jing-Chiou Liou

Abstract:

The Internet of Things (IoT) devices are being used heavily as part of our everyday routines. Through improved communication and automated procedures, its popularity has assisted users in raising the quality of work. These devices are used in healthcare in order to better collect the patient’s data for their treatment. They are generally considered safe and secure. However, there is some possibility that some loopholes do exist which manufacturers do need to identify before some hacker takes advantage of them. For this study, we focused on two medical IoT devices which are pacemakers and hearing aids. The aim of this paper is to identify if there is any likelihood of these medical devices being hijacked and used as a botnet in Distributed Denial-Of Service attacks. Moreover, some mitigation strategies are being proposed to better secure

Keywords: cybersecurity, DDoS, IoT, medical devices

Procedia PDF Downloads 86
1439 Lightweight Cryptographically Generated Address for IPv6 Neighbor Discovery

Authors: Amjed Sid Ahmed, Rosilah Hassan, Nor Effendy Othman

Abstract:

Limited functioning of the Internet Protocol version 4 (IPv4) has necessitated the development of the Internetworking Protocol next generation (IPng) to curb the challenges. Indeed, the IPng is also referred to as the Internet Protocol version 6 (IPv6) and includes the Neighbor Discovery Protocol (NDP). The latter performs the role of Address Auto-configuration, Router Discovery (RD), and Neighbor Discovery (ND). Furthermore, the role of the NDP entails redirecting the service, detecting the duplicate address, and detecting the unreachable services. Despite the fact that there is an NDP’s assumption regarding the existence of trust the links’ nodes, several crucial attacks may affect the Protocol. Internet Engineering Task Force (IETF) therefore has recommended implementation of Secure Neighbor Discovery Protocol (SEND) to tackle safety issues in NDP. The SEND protocol is mainly used for validation of address rights, malicious response inhibiting techniques and finally router certification procedures. For routine running of these tasks, SEND utilizes on the following options, Cryptographically Generated Address (CGA), RSA Signature, Nonce and Timestamp option. CGA is produced at extra high costs making it the most notable disadvantage of SEND. In this paper a clear description of the constituents of CGA, its operation and also recommendations for improvements in its generation are given.

Keywords: CGA, IPv6, NDP, SEND

Procedia PDF Downloads 385
1438 Determining the Information Technologies Usage and Learning Preferences of Construction

Authors: Naci Büyükkaracığan, Yıldırım Akyol

Abstract:

Information technology is called the technology which provides transmission of information elsewhere regardless of time, location, distance. Today, information technology is providing the occurrence of ground breaking changes in all areas of our daily lives. Information can be reached quickly to millions of people with help of information technology. In this Study, effects of information technology on students for educations and their learning preferences were demonstrated with using data obtained from questionnaires administered to students of 2015-2016 academic year at Selcuk University Kadınhanı Faik İçil Vocational School Construction Department. The data was obtained by questionnaire consisting of 30 questions that was prepared by the researchers. SPSS 21.00 package programme was used for statistical analysis of data. Chi-square tests, Mann-Whitney U test, Kruskal-Wallis and Kolmogorov-Smirnov tests were used in the data analysis for Descriptiving statistics. In a study conducted with the participation of 61 students, 93.4% of students' reputation of their own information communication device (computer, smart phone, etc.) That have been shown to be at the same rate and to the internet. These are just a computer of itself, then 45.90% of the students. The main reasons for the students' use of the Internet, social networking sites are 85.24%, 13.11% following the news of the site, as seen. All student assignments in information technology, have stated that they use in the preparation of the project. When students acquire scientific knowledge in the profession regarding their preferred sources evaluated were seen exactly when their preferred internet. Male students showed that daily use of information technology while compared to female students was statistically significantly less. Construction Package program where students are eager to learn about the reputation of 72.13% and 91.80% identified in the well which they agreed that an indispensable element in the professional advancement of information technology.

Keywords: information technologies, computer, construction, internet, learning systems

Procedia PDF Downloads 298
1437 WebGIS Development Framework With Prioritized Usability Elements

Authors: Ezekiel Mwangi, Stephen Kimani, Agnes Mindila

Abstract:

Usability is one of the key factors that determine the success or failure of any WebGIS (technology normally applied on the internet to analyze and present spatial data on the Internet). However, not all the usability attributes have the same impact on usability. It is, therefore, necessary to prioritize WebGIS usability elements and determine the ones that are more crucial to the success of the WebGIS. This research aims to identify the main elements of WebGIS usability, investigate the order of importance and priority of the usability elements of WebGIS, and propose a WebGIS development framework that incorporates the prioritization of the usability elements. This will be achieved through a literature review. The outcome of this research will help usability specialists and WebGIS developers in determining specific usability elements that should be accorded more emphasis during the design and development of WebGIS.

Keywords: framework, prioritization, usability, WebGIS

Procedia PDF Downloads 158
1436 The Driving Force for Taiwan Social Innovation Business Model Transformation: A Case Study of Social Innovation Internet Celebrity Training Project

Authors: Shih-Jie Ma, Jui-Hsu Hsiao, Ming-Ying Hsieh, Shin-Yan Yang, Chun-Han Yeh, Kuo-Chun Su

Abstract:

In Taiwan, social enterprises and non-profit organizations (NPOs) are not familiar with innovative business models, such as live streaming. In 2019, a brand new course called internet celebrity training project is introduced to them by the Social Innovation Lab. The Goal of this paper is to evaluate the effect of this project, to explore the role of new technology (internet live stream) in business process management (BPM), and to analyze how live stream programs can assist social enterprises in creating new business models. Social Innovation, with the purpose to solve social issues in innovative ways, is one of the most popular topics in the world. Social Innovation Lab was established in 2017 by Executive Yuan in Taiwan. The vision of Social Innovation Lab is to exploit technology, innovation and experimental methods to solve social issues, and to maximize the benefits from government investment. Social Innovation Lab aims at creating a platform for both supply and demand sides of social issues, to make social enterprises and start-ups communicate with each other, and to build an eco-system in which stakeholders can make a social impact. Social Innovation Lab keeps helping social enterprises and NPOs to gain better publicity and to enhance competitiveness by facilitating digital transformation. In this project, Social Innovation Lab exerted the influence of social media such as YouTube and Facebook, to make social enterprises and start-ups adjust their business models by using the live stream of social media, which becomes one of the tools to expand their market and diversify their sales channels. Internet live stream training courses were delivered in different regions of Taiwan in 2019, including Taitung, Taichung, Kaohsiung and Hualien. Through these courses, potential groups and enterprises were cultivated to become so-called internet celebrities. With their concern about social issues in mind, these internet celebrities know how to manipulate social media to make a social impact in different fields, such as aboriginal people, food and agriculture, LOHAS (Lifestyles of Health and Sustainability), environmental protection and senior citizens. Participants of live stream training courses in Taiwan are selected to take in-depth interviews and questionnaire surveys. Results indicate that the digital transformation process of social enterprises and NPOs can be successful by implementing business process reengineering, a significant change made by social innovation internet celebrities. Therefore, this project can be the new driving force to facilitate the business model transformation in Taiwan.

Keywords: business process management, digital transformation, live stream, social innovation

Procedia PDF Downloads 146
1435 Assessment of E-learning Facilities and Information Need by Open and Distance Learning Students in Jalingo, Nigeria

Authors: R. M. Bashir, Sabo Elizabeth

Abstract:

Electronic learning is an increasingly popular learning approach in higher educational institutions due to vast growth of internet technology. An investigation on the assessment of e-learning facilities and information need by open and distance learning students in Jalingo, Nigeria was conducted. Structured questionnaires were administered to 70 students of the university. Information sourced from the respondents covered demographic, economic and institutional variables. Data collected for demographic variables were computed as frequency count and percentages. Information on assessment of e-learning facilities and information need among open and distance learning students was computed on a three or four point Likert Rating Scale. Findings indicated that there are more men compared to women, a large proportion of the respondents are married and there are more matured students. A high proportion of the students obtained qualifications higher than the secondary school certificate. The proportion of computer literate students was higher compared with those students that owned a computer. Inadequate e-books and reference materials, internet gadgets and inadequate books (hard copies) and reference material are factors that limit utilization of e-learning facilities. Inadequate computer facilities caused delay in examination schedule at the study center. Open and distance learning students required to a high extent information on university timetable and schedule of activities, books (hard and e-books) and reference materials and contact with course coordinators via internet for better learning and academic performance.

Keywords: open and distance learning, information required, electronic books, internet gadgets, Likert scale test

Procedia PDF Downloads 286
1434 Progress and Challenges of Smart Cities in India: An Exploratory Study

Authors: Sushil K. Sharma, Jeff Zhang, Saeed Tabar

Abstract:

Worldwide, several governments are utilizing the Internet of Things (IoT) and other information and communication technologies (ICTs) to create smart city infrastructures to improve both the quality of government services and citizen welfare. Over 700 cities from around the world have already started implementing their smart city projects. Smart City utilizes the network of connected things, or the Internet of Things (IoT), that interconnects devices and various components across city infrastructure, making them work together seamlessly to enhance the quality, performance, and interactivity of urban services, optimize resources, and reduce costs. Without developing smart cities, the accelerating growth of cities, and their disproportionate consumption of physical and social resources are unsustainable. In 2016, the Indian Government released a list of 100 cities with the intention of kick-starting the process of developing them into 'smart cities’ as part of the Smart Cities Mission. This study reports the progress and challenges of Smart City projects in India. The data were collected through the city/state government websites, media reports, and focus group discussions/interviews. The preliminary results indicate that smart city projects are not only behind in their implementation and scope but also lacks the sincerity for its implementation.

Keywords: smart city, smart government, Internet of Things, digital government

Procedia PDF Downloads 182
1433 Consumer Perception of 3D Body Scanning While Online Shopping for Clothing

Authors: A. Grilec, S. Petrak, M. Mahnic Naglic

Abstract:

Technological development and the globalization in production and sales of clothing in the last decade have significantly influenced the changes in consumer relationship with the industrial-fashioned apparel and in the way of clothing purchasing. The Internet sale of clothing is in a constant and significant increase in the global market, but the possibilities offered by modern computing technologies in the customization segment are not yet fully involved, especially according to the individual customer requirements and body sizes. Considering the growing trend of online shopping, the main goal of this paper is to investigate the differences in customer perceptions towards online apparel shopping and particularly to discover the main differences in perceptions between customers regarding three different body sizes. In order to complete the research goal, the quantitative study on the sample of 85 Croatian consumers was conducted in 2017 in Zagreb, Croatia. Respondents were asked to indicate their level of agreement according to a five-point Likert scale ranging from strongly disagree (1) to strongly agree (5). To analyze attitudes of respondents, simple and descriptive statistics were used. The main findings highlight the differences in respondent perception of 3D body scanning, using 3D body scanning in Internet shopping, online apparel shopping habits regarding their body sizes.

Keywords: consumer behavior, Internet, 3D body scanning, body types

Procedia PDF Downloads 163
1432 Analysis of Spamming Threats and Some Possible Solutions for Online Social Networking Sites (OSNS)

Authors: Dilip Singh Sisodia, Shrish Verma

Abstract:

Spamming is the most common issue seen nowadays in the Internet especially in Online Social Networking Sites (like Facebook, Twitter, and Google+ etc.). Spam messages keep wasting Internet bandwidth and the storage space of servers. On social network sites; spammers often disguise themselves by creating fake accounts and hijacking user’s accounts for personal gains. They behave like normal user and they continue to change their spamming strategy. To prevent this, most modern spam-filtering solutions are deployed on the receiver side; they are good at filtering spam for end users. In this paper we are presenting some spamming techniques their behaviour and possible solutions. We have analyzed how Spammers enters into online social networking sites (OSNSs) and how they target it and the techniques they use for it. The five discussed techniques of spamming techniques which are clickjacking, social engineered attacks, cross site scripting, URL shortening, and drive by download. We have used elgg framework for demonstration of some of spamming threats and respective implementation of solutions.

Keywords: online social networking sites, spam, attacks, internet, clickjacking / likejacking, drive-by-download, URL shortening, networking, socially engineered attacks, elgg framework

Procedia PDF Downloads 347
1431 The Role of Intermediaries in E-Government Adoption in India: Bridging the Digital Divide

Authors: Rajiv Kumar, Amit Sachan, Arindam Mukherjee

Abstract:

Despite the transparency and benefits of e-government, and its potential to serve citizens better, there is low diffusion and adoption of e-government services in India. Limited access to computer and internet, lack of computer and internet skills, low trust in technology, and risk associated in using e-government services are major hindrances in e-government adoption in India. Despite a large number of citizens belonging to the non-adopter category, the government has made some services mandatory to be accessed online where citizens have no other choice. Also despite the digital divide, a large number of citizens prefer online access to government services. In such cases intermediaries like common service centers, internet café and services agents’ roles are significant for accessing e-government services. Hence research is needed to explore this. The study aims to investigate the role of intermediaries in online access to public services by citizens. Qualitative research methodology using semi-structured interview was used. The results show that intermediaries play an important role in bridging the digital divide. The study also highlights on what circumstances citizens are taking help of these intermediaries. The study then highlights its limitations and discusses scope for future study.

Keywords: adoption, digital divide, e-government, India, intermediaries

Procedia PDF Downloads 293
1430 Online Social Network Vital to Hospitality and Tourism Marketing and Management

Authors: Nureni Asafe Yekini, Olawale Nasiru Lawal, Bola Dada, Gabriel Adeyemi Okunlola

Abstract:

This study is focused on the strengths and challenges associated with using the online social network as a rapidly evolving medium in marketing tourism services and businesses among the youths in Nigeria. The paper examines the Nigerian tourists’ attitude, mainly towards three aspects: application of Internet for travel and tourism; usage of online social networks in sharing travel and tourism experiences; and trust in electronic-media for marketing tourism businesses and services. The aim of this research is to determine the level of application of internet tools in marketing tourism businesses and services in Nigeria. This study reports an empirical analysis based on data obtained from a survey among 1004 Nigerian tourists. The outcome confirms the research hypothesis and points to crucial importance of introducing online social network site for marketing tourism businesses and services in Nigeria, and increasing the awareness for Nigeria as a tourist destination. Moreover, the paper strongly recommends the use of online social network as a tool for marketing tourism businesses and services, and the need for identifying effective framework for application of ICT tools in marketing tourism businesses and services in Nigeria at large.

Keywords: tourism business, internet, online social networks, tourism services, ICT

Procedia PDF Downloads 356
1429 Green Supply Chain Network Optimization with Internet of Things

Authors: Sema Kayapinar, Ismail Karaoglan, Turan Paksoy, Hadi Gokcen

Abstract:

Green Supply Chain Management is gaining growing interest among researchers and supply chain management. The concept of Green Supply Chain Management is to integrate environmental thinking into the Supply Chain Management. It is the systematic concept emphasis on environmental problems such as reduction of greenhouse gas emissions, energy efficiency, recycling end of life products, generation of solid and hazardous waste. This study is to present a green supply chain network model integrated Internet of Things applications. Internet of Things provides to get precise and accurate information of end-of-life product with sensors and systems devices. The forward direction consists of suppliers, plants, distributions centres and sales and collect centres while, the reverse flow includes the sales and collects centres, disassembled centre, recycling and disposal centre. The sales and collection centre sells the new products are transhipped from factory via distribution centre and also receive the end-of life product according their value level. We describe green logistics activities by presenting specific examples including “recycling of the returned products and “reduction of CO2 gas emissions”. The different transportation choices are illustrated between echelons according to their CO2 gas emissions. This problem is formulated as a mixed integer linear programming model to solve the green supply chain problems which are emerged from the environmental awareness and responsibilities. This model is solved by using Gams package program. Numerical examples are suggested to illustrate the efficiency of the proposed model.

Keywords: green supply chain optimization, internet of things, greenhouse gas emission, recycling

Procedia PDF Downloads 328
1428 Mechanisms Underlying the Effects of School-Based Internet Intervention for Alcohol Drinking Behaviours among Chinese Adolescent

Authors: Keith T. S. Tung, Frederick K. Ho, Rosa S. Wong, Camilla K. M. Lo, Wilfred H. S. Wong, C. B. Chow, Patrick Ip

Abstract:

Objectives: Underage drinking is an important public health problem both locally and globally. Conventional prevention/intervention relies on unidirectional knowledge transfer such as mail leaflets or health talks which showed mixed results in changing the target behaviour. Previously, we conducted a school internet-based intervention which was found to be effective in reducing alcohol use among adolescents, yet the underlying mechanisms have not been properly investigated. This study, therefore, examined the mechanisms that explain how the intervention produced a change in alcohol drinking behaviours among Chinese adolescent as observed in our previous clustered randomised controlled trial (RCT) study. Methods: This is a cluster randomised controlled trial with parallel group design. Participating schools were randomised to the Internet intervention or the conventional health education group (control) with a 1:1 allocation ratio. Secondary 1–3 students of the participating schools were enrolled in this study. The Internet intervention was a web-based quiz game competition, in which participating students would answer 1,000 alcohol-related multiple-choice quiz questions. Conventional health education group received a promotional package on equivalent alcohol-related knowledge. The participants’ alcohol-related attitude, knowledge, and perceived behavioural control were self-reported before the intervention (baseline) and one month and three months after the intervention. Results: Our RCT results showed that participants in the Internet group were less likely to drink (risk ratio [RR] 0.79, p < 0.01) as well as in lesser amount (β -0.06, p < 0.05) compared to those in the control group at both post-intervention follow-ups. Within the intervention group, regression analyses showed that high quiz scorer had greater improvement in alcohol-related knowledge (β 0.28, p < 0.01) and attitude (β -0.26, p < 0.01) at 1 month after intervention, which in turn increased their perceived behavioural control against alcohol use (β 0.10 and -0.26, both p < 0.01). Attitude, compared to knowledge, was found to be a stronger contributor to the intervention effect on perceived behavioural control. Conclusions: Our internet-based intervention has demonstrated effectiveness in reducing the risk of underage drinking when compared with conventional health education. Our study results further showed an attitude to be a more important factor than knowledge in changing health-related behaviour. This has an important implication for future prevention/intervention on an underage drinking problem.

Keywords: adolescents, internet-based intervention, randomized controlled trial, underage drinking

Procedia PDF Downloads 164
1427 Internet of Things based AquaSwach Water Purifier

Authors: Karthiyayini J., Arpita Chowdary Vantipalli, Darshana Sailu Tanti, Malvika Ravi Kudari, Krtin Kannan

Abstract:

This paper is propelled from the generally existing undertaking of the smart water quality management, which addresses an IoT (Internet of things) based brilliant water quality observing (SWQM) framework which we call it AquaSwach that guides in the ceaseless estimation of water conditions dependent on five actual boundaries i.e., temperature, pH, electric conductivity and turbidity properties and water virtue estimation each time you drink water. Six sensors relate to Arduino-Mega in a discrete way to detect the water parameters. Extracted data from the sensors are transmitted to a desktop application developed in the NET platform and compared with the WHO (World Health Organization) standard values.

Keywords: AquaSwach, IoT, WHO, water quality

Procedia PDF Downloads 213
1426 Consumer Based Online Authenticity: An Exploratory Approach: Case of Terroir Product of Souss Massa Region, Morocco

Authors: Fatima Ezzahra Ouboutaib, Abdellatif Aitheda, Soumiya Mekkaoui

Abstract:

Marketing research is starting to focus on authenticity to position an offer, especially local products. However, its use remains more problematic with the internet for cooperatives. This paper investigates how digitalization impacts the satisfaction of the quest for authenticity. On the theoretical level, it explains authenticity in online and offline contexts in the postmodernism era. Then, an exploratory qualitative study tries to understand the contribution of digitization to the satisfaction of the search for authenticity. Therefore, cooperatives selling terroir products on the Internet are advised to keep also direct contact which tends to show a traditional manner of production to enhance customers’ perception of terroir product authenticity.

Keywords: authenticity, terroir product, online authenticity, postmodernism

Procedia PDF Downloads 141
1425 Mobile Systems: History, Technology, and Future

Authors: Shivendra Pratap Singh, Rishabh Sharma

Abstract:

The widespread adoption of mobile technology in recent years has revolutionized the way we communicate and access information. The evolution of mobile systems has been rapid and impactful, shaping our lives and changing the way we live and work. However, despite its significant influence, the history and development of mobile technology are not well understood by the general public. This research paper aims to examine the history, technology and future of mobile systems, exploring their evolution from early mobile phones to the latest smartphones and beyond. The study will analyze the technological advancements and innovations that have shaped the mobile industry, from the introduction of mobile internet and multimedia capabilities to the integration of artificial intelligence and 5G networks. Additionally, the paper will also address the challenges and opportunities facing the future of mobile technology, such as privacy concerns, battery life, and the increasing demand for high-speed internet. Finally, the paper will also provide insights into potential future developments and innovations in the mobile sector, such as foldable phones, wearable technology, and the Internet of Things (IoT). The purpose of this research paper is to provide a comprehensive overview of the history, technology, and future of mobile systems, shedding light on their impact on society and the challenges and opportunities that lie ahead.

Keywords: mobile technology, artificial intelligence, networking, iot, technological advancements, smartphones

Procedia PDF Downloads 92
1424 Effect of Media on Psycho-Social Interaction among the Children with Their Parents of Urban People in Dhaka

Authors: Nazma Sultana

Abstract:

Social media has become an important part of our daily life. It has a significance influences on the people who use them in their daily life frequently. The number of people using social network sites has been increasing continuously. For this frequent utilization has started to affect our social life. This study examine whether the use of social network sites affects the psychosocial interaction between children and their parents. At first parents introduce their children to the internet and different type of device in their early childhood. Many parents use device for feeding their children by watching rhyme or cartoon. As a result children are habituate with it. In Bangladesh 70% people are heavy internet users. About 23 percent of them spend more than five hours on the social networking sites a day. Media are increasing pervasive in the lives of children-roughly the average child today spends nearly about 45 hours per week with media, compared with 17 hours with parents and 30 hours in school. According to a social learning theory, children & adolescents learn by observing & imitating what they see on screen particularly when these behaviors are realistic or are rewarded. The influence of the media on the psychosocial development of children is profound. Thus it is important for parents to provide guidance on age-appropriate use of all media, including television, radio, music, video games and the internet.

Keywords: social media, psychosocial, Technology, Parent, Social Relationship, Adolescents, Teenage, Youth

Procedia PDF Downloads 112
1423 Analysis of Secondary School Students' Perceptions about Information Technologies through a Word Association Test

Authors: Fetah Eren, Ismail Sahin, Ismail Celik, Ahmet Oguz Akturk

Abstract:

The aim of this study is to discover secondary school students’ perceptions related to information technologies and the connections between concepts in their cognitive structures. A word association test consisting of six concepts related to information technologies is used to collect data from 244 secondary school students. Concept maps that present students’ cognitive structures are drawn with the help of frequency data. Data are analyzed and interpreted according to the connections obtained as a result of the concept maps. It is determined students associate most with these concepts—computer, Internet, and communication of the given concepts, and associate least with these concepts—computer-assisted education and information technologies. These results show the concepts, Internet, communication, and computer, are an important part of students’ cognitive structures. In addition, students mostly answer computer, phone, game, Internet and Facebook as the key concepts. These answers show students regard information technologies as a means for entertainment and free time activity, not as a means for education.

Keywords: word association test, cognitive structure, information technology, secondary school

Procedia PDF Downloads 413
1422 Social Media as a Source of Radicalization; A Case Study of Pakistan

Authors: Manam Hanfi

Abstract:

Pakistan is a victim of terrorism since 9/11 attacks. Since then it is a home for violence and extremism. One of the major reasons behind rising violence and extremism in Pakistan is radicalization. Pakistan has seen and suffered from the modification of terrorism from old to new. In new terrorism, the terrorist organizations incorporated internet to disseminate propaganda, to recruit and train people. The study focuses on the relationship between Pakistan and new terrorism and examines how the internet is being used by terrorist organizations. The study investigates radicalization through social media by terrorist organizations in Pakistan with the help of case studies. The study suggests five ways to counter radicalization, including, counter narrative on social media, content analysis of the data on the internet, curriculum and madrassa reforms, teaching peace education in the educational institutions and use of technical software such as eGLYPH to quickly remove violent data from social media. Lastly, the research attempted to contribute in counter-radicalization by combining the media dependency model and ideas for counter-radicalization. The dependency model elaborates the impact of mass media content on the audience. If media dependency is high, it will cause cognitive, affective and behavioral changes. In order to counter radicalization through social media, it is important to make cognitive, affective and behavioral changes with the help of counter-radicalization suggestions.

Keywords: counter radicalization, extremism, social media, terrorism

Procedia PDF Downloads 155
1421 Protection of Website Owners' Rights: Proportionality of Website Blocking in Russia and Beyond

Authors: Ekaterina Semenova

Abstract:

The article explores the issue of website owners’ liability for the illicit content. Whilst various issues of secondary liability of internet access providers for the illicit content have been widely discussed in the law doctrine, the liability of website owners has attracted less attention. Meanwhile, the website blocking injunctions influence website owners’ rights most, since website owners have the interest to keep their website online, rather than internet access providers. The discussion of internet access providers’ liability overshadows the necessity to protect the website owners’ rights to due process and proportionality of blocking injunctions. The analysis of Russian website blocking regulation and case law showed that the protection of website owners’ rights depends on the kind of illicit content: some content induces automatic blocking injunctions without prior notice of website owners and any opportunity to appeal, while other content does not invoke automatic blocking and provides an opportunity for the website owner to avoid or appeal an injunction. Comparative analysis of website blocking regulations in European countries reveals different approaches to the proportionality of website blocking and website owner’s rights protection. Based on the findings of the study, we conclude that the global trend to impose website blocking injunctions on wide range of illicit content without due process of law interferes with the rights of website owners.

Keywords: illicit content, liability, Russia, website blocking

Procedia PDF Downloads 352
1420 Solar Power Monitoring and Control System using Internet of Things

Authors: Oladapo Tolulope Ibitoye

Abstract:

It has become imperative to harmonize energy poverty alleviation and carbon footprint reduction. This is geared towards embracing independent power generation at local levels to reduce the popular ambiguity in the transmission of generated power. Also, it will contribute towards the total adoption of electric vehicles and direct current (DC) appliances that are currently flooding the global market. Solar power system is gaining momentum as it is now an affordable and less complex alternative to fossil fuel-based power generation. Although, there are many issues associated with solar power system, which resulted in deprivation of optimum working capacity. One of the key problems is inadequate monitoring of the energy pool from solar irradiance, which can then serve as a foundation for informed energy usage decisions and appropriate solar system control for effective energy pooling. The proposed technique utilized Internet of Things (IoT) in developing a system to automate solar irradiance pooling by controlling solar photovoltaic panels autonomously for optimal usage. The technique is potent with better solar irradiance exposure which results into 30% voltage pooling capacity than a system with static solar panels. The evaluation of the system show that the developed system possesses higher voltage pooling capacity than a system of static positioning of solar panel.

Keywords: solar system, internet of things, renewable energy, power monitoring

Procedia PDF Downloads 83