Search results for: message framing
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 531

Search results for: message framing

321 Reclaiming the House with Use of Web 2.0 Tools: Democratic Candidates and Social Media during Midterm Elections in 2018

Authors: Norbert Tomaszewski

Abstract:

Modern politicians tend to resign from the traditional media as Web 2.0 tools allow them to interact with a much bigger audience while spending less money on their campaign. Current studies on this subject prove that in order to win the elections, the candidate needs to show his personal side during the campaign to appeal to the voter as an average citizen. Because of that, the internet user may engage in the politician's campaign by spreading his message along with his followers. The aim of the study is to determine how did the Democratic candidates use the Web 2.0 tools during the 2018 midterm elections campaign and whether they managed to succeed. Taking into consideration the fact that the United States as a country, has always set important milestones for the political marketing as a field of science, the result of the research can set some examples on how to manage the modern internet campaign in less developed countries.

Keywords: political campaign, midterm elections, social media, Web 2.0

Procedia PDF Downloads 144
320 Efficient Bargaining versus Right to Manage in the Era of Liberalization

Authors: Panagiota Koliousi, Natasha Miaouli

Abstract:

We compare product and labour market liberalization under the two trade union bargaining models: the Right-to-Manage (RTM) model and the Efficient Bargaining (EB) model. The vehicle is a dynamic general equilibrium (DGE) model that incorporates two types of agents (capitalists and workers), imperfectly competitive product and labour markets. The model is solved numerically employing common parameter values and data from the euro area. A key message is that product market deregulation is favourable under any labour market structure while opting for labour market deregulation one should provide special attention to the structure of the labour market such as the bargaining system of unions. If the prevailing way of bargaining is the RTM model then restructuring both markets is beneficial for all agents.

Keywords: market structure, structural reforms, trade unions, unemployment

Procedia PDF Downloads 192
319 An Efficient Proxy Signature Scheme Over a Secure Communications Network

Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi

Abstract:

Proxy signature scheme permits an original signer to delegate his/her signing capability to a proxy signer, and then the proxy signer generates a signing message on behalf of the original signer. The two parties must be able to authenticate one another and agree on a secret encryption key, in order to communicate securely over an unreliable public network. Authenticated key agreement protocols have an important role in building secure communications network between the two parties. In this paper, we present a secure proxy signature scheme over an efficient and secure authenticated key agreement protocol based on the discrete logarithm problem.

Keywords: proxy signature, warrant partial delegation, key agreement, discrete logarithm

Procedia PDF Downloads 335
318 Streaming Communication Component for Multi-Robots

Authors: George Oliveira, Luana D. Fronza, Luiza Medeiros, Patricia D. M. Plentz

Abstract:

The research presented in this article is part of a wide project that proposes a scheduling system for multi-robots in intelligent warehouses employing multi-robot path-planning (MPP) and multi-robot task allocation (MRTA) to reconcile multiple restrictions (task delivery time, task priorities, charging capacity, and robots battery capacity). We present the software component capable of interconnecting an open streaming processing architecture and robot operating system (ROS), ensuring communication and message exchange between robots and the environment in which they are inserted. Simulation results show the good performance of our proposed technique for connecting ROS and streaming platforms.

Keywords: complex distributed systems, mobile robots, smart warehouses, streaming platforms

Procedia PDF Downloads 176
317 Managing the Local Manager: A Comparative Study of Core HRM Functions in Multinationals

Authors: Maria Khan

Abstract:

Framing good core Human Resource Management (HRM) functions like recruitment, selection, training and development, which if executed effectively, can become a strategic advantage for a company. HRM policies related to mid-level managers can depend on the type of top management. This may be due to the difference in perception of effective HRM policies of an expatriate and local leadership. This comparative case study assesses how local mid-level managers are managed in leading multinational telecom companies in Pakistan. Core HRM functions related to managers were analysed through field research based on semi-structured interviews with relevant Human Resource Managers. Results suggest that recruitment and selection practices are not too different and are in compliance with best HRM practices. However, there is a difference in the effective implementation of Training and Development policies. Changing global management trends and skill development dictate that MNCs continuously develop the local talent effectively for local and international success.

Keywords: recruitment, selection, training, development, core HRM, human resource management, subsidiary, international staffing, managers, MNC, expatriate

Procedia PDF Downloads 314
316 Secure E-Pay System Using Steganography and Visual Cryptography

Authors: K. Suganya Devi, P. Srinivasan, M. P. Vaishnave, G. Arutperumjothi

Abstract:

Today’s internet world is highly prone to various online attacks, of which the most harmful attack is phishing. The attackers host the fake websites which are very similar and look alike. We propose an image based authentication using steganography and visual cryptography to prevent phishing. This paper presents a secure steganographic technique for true color (RGB) images and uses Discrete Cosine Transform to compress the images. The proposed method hides the secret data inside the cover image. The use of visual cryptography is to preserve the privacy of an image by decomposing the original image into two shares. Original image can be identified only when both qualified shares are simultaneously available. Individual share does not reveal the identity of the original image. Thus, the existence of the secret message is hard to be detected by the RS steganalysis.

Keywords: image security, random LSB, steganography, visual cryptography

Procedia PDF Downloads 321
315 Differential Terrain: A Spectrum in Capitalism Transformation

Authors: Sibo Lu, Zhongkai Qian

Abstract:

This study endeavors to articulate a spectrum of capitalist transformation from a politico-economic perspective, categorizing the development of capitalism into pre-modern, modern, and post-modern stages while examining the transitions between these states. It critically engages with the concepts of pre-modernity, modernity, and post-modernity, typically aligned with cultural studies, to shed light on their objective changes in the politico-economic realm. Post-modernity, in this context, is associated with the transition to high-value-added services and economic growth in ‘developed’ countries amidst globalization, framing a ‘neoliberal’ economic transformation. The paper scrutinizes the neoliberal economic shifts in the latter half of the 20th century as part of the post-modern state, arguing against viewing post-modernity merely as a cultural or subjective interpretative stance. Instead, it is posited as a concrete politico-economic phase marked by the dominance of post-Fordist systems. Through integrating insights from the political economy with continental philosophy, this research provides a nuanced analysis of capitalism's evolution, challenging conventional class analyses under the capitalist system and fostering a broader understanding of socio-economic paradigms.

Keywords: post marxism, critical theory, political economy, capitalism transformation

Procedia PDF Downloads 26
314 Image Steganography Using Least Significant Bit Technique

Authors: Preeti Kumari, Ridhi Kapoor

Abstract:

 In any communication, security is the most important issue in today’s world. In this paper, steganography is the process of hiding the important data into other data, such as text, audio, video, and image. The interest in this topic is to provide availability, confidentiality, integrity, and authenticity of data. The steganographic technique that embeds hides content with unremarkable cover media so as not to provoke eavesdropper’s suspicion or third party and hackers. In which many applications of compression, encryption, decryption, and embedding methods are used for digital image steganography. Due to compression, the nose produces in the image. To sustain noise in the image, the LSB insertion technique is used. The performance of the proposed embedding system with respect to providing security to secret message and robustness is discussed. We also demonstrate the maximum steganography capacity and visual distortion.

Keywords: steganography, LSB, encoding, information hiding, color image

Procedia PDF Downloads 464
313 Network Mobility Support in Content-Centric Internet

Authors: Zhiwei Yan, Jong-Hyouk Lee, Yong-Jin Park, Xiaodong Lee

Abstract:

In this paper, we analyze NEtwork MObility (NEMO) supporting problems in Content-Centric Networking (CCN), and propose the CCN-NEMO which can well support the deployment of the content-centric paradigm in large-scale mobile Internet. The CCN-NEMO extends the signaling message of the basic CCN protocol, to support the mobility discovery and fast trigger of Interest re-issuing during the network mobility. Besides, the Mobile Router (MR) is extended to optimize the content searching and relaying in the local subnet. These features can be employed by the nested NEMO to maximize the advantages of content retrieving with CCN. Based on the analysis, we compare the performance on handover latency between the basic CCN and our proposed CCN-NEMO. The results show that our scheme can facilitate the content-retrieving in the NEMO scenario with improved performance.

Keywords: NEMO, CCN, mobility, handover latency

Procedia PDF Downloads 461
312 A Light in the Road of Protection of Civilians: Responsibility to Protect

Authors: Zeynep Selin Acar

Abstract:

In the world of wars, it is aimed to find ways to protect civilians propound by political elites. Current threats may come from edges of the security concerns, meaning uncontrollable terrorist groups, unanticipated government-supported armed groups or separatists, and unimaginable merge of the previous with foreign supports or oppositions of which could flow into all groups– flaws of international state system. These threats resulted in transformation of inter-state system into a world system with distinctive actors and brought along the changes in strategic plans of political and military bodies, as well as adaptations of principles framing the strategies in terms of may-be-applicable international law constrained by ethical considerations. This paper aims to analyse the Responsibility to Protect (RtoP), being one of those, with its criteria aiming to regulate military interventions taking the protection of civilians both as the reason for intervention, jus ad bellum or right to war, and as the duties during the intervention, jus in bello or how to conduct the war. In addition it will discuss the rise of its bindingness in terms of Responsibility Not to Veto (RNtoV), Franco/Mexican Political Declaration opened in signature for UN member states on September 2015.

Keywords: civilian protection, protection as responsibility, responsibility to protect, responsibility not to veto

Procedia PDF Downloads 254
311 Factors behind Success of Nascent Social Enterprises in Pakistan: An Exploratory Factor Analysis

Authors: Abida Zanib

Abstract:

Social entrepreneurship is an attention-grabbing area to meet social needs. Stakeholders in the social sector of Pakistan, particularly investors, development activists and policy makers are considering it as an engine to economic growth and powerful tool to address social issues in inventive ways. However, absence of specific policy and legitimacy issues create hurdles in the way of success for emerging start-ups. The review of the literature reveals that research in this emerging phenomenon particularly in the case of Pakistan is inadequate. To fill this gap in the literature, this study aims to scrutinize characteristics of nascent social enterprises. The study collects data from 65-emerging social enterprises using questionnaire. The results of factor analysis highlight optimistic and driving qualities of Pakistani social entrepreneurs, which help them to survive and grow in the business world. Moreover, the study identifies several areas for improvements such as information disclosure, networking, corporate governance, mentorship programs, and trainings. The study notes that despite the absence of specific policy, dynamic entrepreneurial culture is fostering in Pakistan and recommends re-framing the education policy to support the development of social entrepreneurship.

Keywords: emerging, entrepreneurs, Pakistan, social, start-ups

Procedia PDF Downloads 142
310 Motherhood Medicalization and Marketing: From Media Frames to Women's Decisions

Authors: Leila Mohammadi

Abstract:

This article discusses the technology of social egg freezing in the context of existing literature on medicalization, motherhood, and marketing. The social egg freezing technique offers to preserve some healthy eggs for age-related fertility decline in the future. The study draws on a qualitative analysis and participants observation of media publications, including text, images, or audio-visual about social egg freezing technology and postpone maternity, to identify and compare their communication strategies from a framing theory perspective. Using 442 surveys and 158 pieces of publications in Spanish media, this study demonstrated that the narratives used by these publications and their structures follow a marketing objective to medicalize motherhood. Within these frames, the market of preserving fertility is cast to show compassion and concern about women. In the opinion of participants, egg freezing technology liberates, empowers, and automates women from patriarchal control, and also gives them the responsibility of taking care of their body and reproductive system. This study showed this opinion is significantly influenced by media and their communication strategies supported by providers of this business.

Keywords: motherhood, social egg freezing, medicalization, marketing, media frames, fertility, assisted reproductive system

Procedia PDF Downloads 121
309 Facebook Spam and Spam Filter Using Artificial Neural Networks

Authors: A. Fahim, Mutahira N. Naseem

Abstract:

SPAM is any unwanted electronic message or material in any form posted to many people. As the world is growing as global world, social networking sites play an important role in making world global providing people from different parts of the world a platform to meet and express their views. Among different social networking sites facebook become the leading one. With increase in usage different users start abusive use of facebook by posting or creating ways to post spam. This paper highlights the potential spam types nowadays facebook users faces. This paper also provide the reason how user become victim to spam attack. A methodology is proposed in the end discusses how to handle different types of spam.

Keywords: artificial neural networks, facebook spam, social networking sites, spam filter

Procedia PDF Downloads 367
308 Unraveling the Enigma of Military Coups through the Lens of State Fragility: A Qualitative Exploration of the Malian and Burkinabe Case

Authors: Deretha Bester

Abstract:

This article explores the recent military coups in Mali (August 2020) and Burkina Faso (January 2022), utilizing qualitative case study analyses to examine the pre-coup domestic contextual conditions that precipitated the events. By framing the research through the conceptual lens of state fragility, the research identifies key political, economic, and societal factors that converge to create an environment conducive for coups to occur. From the analyses, the study discusses several patterns that emerged, all revealing the significance of the core functions of governance. Through an in-depth exploration that brings the state back into the coup debate, the study provides rich insights into the complex dynamics of military intervention in political affairs, highlighting the urgency of understanding the underlying domestic factors that can lead to radical political changes. By illuminating these intricate dynamics, the article seeks to provide detailed insights needed to fully understand the challenges moulding the region's political terrain.

Keywords: governance failures, military coups, political dynamics, Sahel region, state fragility

Procedia PDF Downloads 44
307 Secure Proxy Signature Based on Factoring and Discrete Logarithm

Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi

Abstract:

A digital signature is an electronic signature form used by an original signer to sign a specific document. When the original signer is not in his office or when he/she travels outside, he/she delegates his signing capability to a proxy signer and then the proxy signer generates a signing message on behalf of the original signer. The two parties must be able to authenticate one another and agree on a secret encryption key, in order to communicate securely over an unreliable public network. Authenticated key agreement protocols have an important role in building a secure communications network between the two parties. In this paper, we present a secure proxy signature scheme over an efficient and secure authenticated key agreement protocol based on factoring and discrete logarithm problem.

Keywords: discrete logarithm, factoring, proxy signature, key agreement

Procedia PDF Downloads 299
306 Cultural Transformation in Interior Design in Commercial Space in India

Authors: Siddhi Pedamkar, Reenu Singh

Abstract:

This report is based on how a culture transforms from one era to another era in commercial space. This transformation is observed in commercial as well as residential spaces. The spaces have specific color concepts, surface detailing furniture, and function-specific layouts. But the cultural impact is very rarely seen in commercial spaces, mostly because the interior is divine by function to a large extent. Information was collected from books and research papers. A quantitative survey was conducted to understand people's perceptions about the impact of culture on design entities and how culture dictates the different types of space and their character. The survey also highlights the impact of types of interior lighting, colour schemes, and furniture types on the interior environment. The questionnaire survey helped in framing design parameters for contemporary interior design. The design parameters are used to propose design options for new-age furniture that can be used in co-working spaces. For the new and contemporary working spaces, new age design furniture, interior elements such as visual partition, semi-visual partition, lighting, and layout can be transformed by cultural changes in the working style of people and organization.

Keywords: commercial space, culture, environment, furniture, interior

Procedia PDF Downloads 98
305 Bifurcation and Stability Analysis of the Dynamics of Cholera Model with Controls

Authors: C. E. Madubueze, S. C. Madubueze, S. Ajama

Abstract:

Cholera is a disease that is predominately common in developing countries due to poor sanitation and overcrowding population. In this paper, a deterministic model for the dynamics of cholera is developed and control measures such as health educational message, therapeutic treatment, and vaccination are incorporated in the model. The effective reproduction number is computed in terms of the model parameters. The existence and stability of the equilibrium states, disease free and endemic equilibrium states are established and showed to be locally and globally asymptotically stable when R0 < 1 and R0 > 1 respectively. The existence of backward bifurcation of the model is investigated. Furthermore, numerical simulation of the model developed is carried out to show the impact of the control measures and the result indicates that combined control measures will help to reduce the spread of cholera in the population

Keywords: backward bifurcation, cholera, equilibrium, dynamics, stability

Procedia PDF Downloads 423
304 High Performance Electrocardiogram Steganography Based on Fast Discrete Cosine Transform

Authors: Liang-Ta Cheng, Ching-Yu Yang

Abstract:

Based on fast discrete cosine transform (FDCT), the authors present a high capacity and high perceived quality method for electrocardiogram (ECG) signal. By using a simple adjusting policy to the 1-dimentional (1-D) DCT coefficients, a large volume of secret message can be effectively embedded in an ECG host signal and be successfully extracted at the intended receiver. Simulations confirmed that the resulting perceived quality is good, while the hiding capability of the proposed method significantly outperforms that of existing techniques. In addition, our proposed method has a certain degree of robustness. Since the computational complexity is low, it is feasible for our method being employed in real-time applications.

Keywords: data hiding, ECG steganography, fast discrete cosine transform, 1-D DCT bundle, real-time applications

Procedia PDF Downloads 186
303 High Capacity Reversible Watermarking through Interpolated Error Shifting

Authors: Hae-Yeoun Lee

Abstract:

Reversible watermarking that not only protects the copyright but also preserve the original quality of the digital content have been intensively studied. In particular, the demand for reversible watermarking has increased. In this paper, we propose a reversible watermarking scheme based on interpolation-error shifting and error precompensation. The intensity of a pixel is interpolated from the intensities of neighbouring pixels, and the difference histogram between the interpolated and the original intensities is obtained and modified to embed the watermark message. By restoring the difference histogram, the embedded watermark is extracted and the original image is recovered by compensating for the interpolation error. The overflow and underflow are prevented by error precompensation. To show the performance of the method, the proposed algorithm is compared with other methods using various test images.

Keywords: reversible watermarking, high capacity, high quality, interpolated error shifting, error precompensation

Procedia PDF Downloads 315
302 Adaptation in Translation of 'Christmas Every Day' Short Story by William Dean Howells

Authors: Mohsine Khazrouni

Abstract:

The present study is an attempt to highlight the importance of adaptation in translation. To convey the message, the translator needs to take into account not only the text but also extra-linguistic factors such as the target audience. The present paper claims that adaptation is an unavoidable translation strategy when dealing with texts that are heavy with religious and cultural themes. The translation task becomes even more challenging when dealing with children’s literature as the audience are children whose comprehension, experience and world knowledge are limited. The study uses the Arabic translation of the short story ‘Christmas Every Day’ as a case study. The short story will be translated, and the pragmatic problems involved will be discussed. The focus will be on the issue of adaptation. i.e., the source text should be adapted to the target language audience`s social and cultural environment.

Keywords: pragmatic adaptation, Arabic translation, children's literature, equivalence

Procedia PDF Downloads 202
301 Participatory and Experience Design in Advertising: An Exploratory Study of Advertising Styles of Cultures

Authors: Irem Ela Yildizeli

Abstract:

Advertising today has become an indispensable phenomenon both for businesses and consumers. Due to the conditions of rapid changes in the market and growth of competitiveness, the success of many of firms that produce similar merchandise depends largely on how professionally and effective they use marketing communication elements which also must have some sense of shared values between the message provider and the receiver within cultural and global trend. This paper demonstrates how consumer behaviour and communication through cultural values evaluate advertising styles. Using samples of award-winning ads from both author's and other professional's creative works, the study reveals a significant correlation between the cultural elements and advertisement reception for language and cultural norms respectively. The findings of this study draw attention to the change of communication in the beginning of the 21st century which has shaped a new style of Participatory and Experience Design in advertising.

Keywords: advertising, advertising style, culture, experience design, participatory design

Procedia PDF Downloads 149
300 An Android Application for ECG Monitoring and Evaluation Using Pan-Tompkins Algorithm

Authors: Cebrail Çiflikli, Emre Öner Tartan

Abstract:

Parallel to the fast worldwide increase of elderly population and spreading unhealthy life habits, there is a significant rise in the number of patients and health problems. The supervision of people who have health problems and oversight in detection of people who have potential risks, bring a considerable cost to health system and increase workload of physician. To provide an efficient solution to this problem, in the recent years mobile applications have shown their potential for wide usage in health monitoring. In this paper we present an Android mobile application that records and evaluates ECG signal using Pan-Tompkins algorithm for QRS detection. The application model includes an alarm mechanism that is proposed to be used for sending message including abnormality information and location information to health supervisor.

Keywords: Android mobile application, ECG monitoring, QRS detection, Pan-Tompkins Algorithm

Procedia PDF Downloads 224
299 An Optimal Steganalysis Based Approach for Embedding Information in Image Cover Media with Security

Authors: Ahlem Fatnassi, Hamza Gharsellaoui, Sadok Bouamama

Abstract:

This paper deals with the study of interest in the fields of Steganography and Steganalysis. Steganography involves hiding information in a cover media to obtain the stego media in such a way that the cover media is perceived not to have any embedded message for its unintended recipients. Steganalysis is the mechanism of detecting the presence of hidden information in the stego media and it can lead to the prevention of disastrous security incidents. In this paper, we provide a critical review of the steganalysis algorithms available to analyze the characteristics of an image stego media against the corresponding cover media and understand the process of embedding the information and its detection. We anticipate that this paper can also give a clear picture of the current trends in steganography so that we can develop and improvise appropriate steganalysis algorithms.

Keywords: optimization, heuristics and metaheuristics algorithms, embedded systems, low-power consumption, steganalysis heuristic approach

Procedia PDF Downloads 286
298 Cryptography and Cryptosystem a Panacea to Security Risk in Wireless Networking

Authors: Modesta E. Ezema, Chikwendu V. Alabekee, Victoria N. Ishiwu, Ifeyinwa NwosuArize, Chinedu I. Nwoye

Abstract:

The advent of wireless networking in computing technology cannot be overemphasized, it opened up easy accessibility to information resources, networking made easier and brought internet accessibility to our doorsteps, but despite all these, some mishap came in with it that is causing mayhem in today ‘s overall information security. The cyber criminals will always compromise the integrity of a message that is not encrypted or that is encrypted with a weak algorithm.In other to correct the mayhem, this study focuses on cryptosystem and cryptography. This ensures end to end crypt messaging. The study of various cryptographic algorithms, as well as the techniques and applications of the cryptography for efficiency, were all considered in the work., present and future applications of cryptography were dealt with as well as Quantum Cryptography was exposed as the current and the future area in the development of cryptography. An empirical study was conducted to collect data from network users.

Keywords: algorithm, cryptography, cryptosystem, network

Procedia PDF Downloads 335
297 The Turkish Anti-Nuclear Platform: A Counter-Hegemonic Struggle

Authors: Sevgi Balkan-Sahin

Abstract:

The Justice and Development Party (AKP) government has included nuclear power as a major component of Turkey’s new energy strategy by promoting it as the only alternative for Turkey to diversify energy resources, trigger economic growth, and boost competitiveness of the country. The effective promotion of such a framing has created a hegemonic discourse around nuclear energy in Turkey. However, fiercely opposing the nuclear initiative of the government, the Turkish anti-nuclear platform (ANP) composed of more than 50 civil society groups has challenged the hegemonic discourse of the AKP government by presenting nuclear energy as dangerous for human health, human rights, and the protection of environment. Based on an engagement between Gramscian perspective and Laclau and Mouffe’s discourse theory, this paper considers the discourses of the Turkish anti-nuclear platform and its associated activities as a counter-hegemonic strategy to change the ‘common sense’ on nuclear energy in Turkey. Analyzing the data from interviews with the representatives of the anti-nuclear platform coupled with primary sources, such as Parliamentary Records and official statements by civil society organizations, the paper highlights how the anti-nuclear platform exercises power through counter-hegemonic discourses in terms of the delegitimization of nuclear energy in Turkey.

Keywords: counter-hegemony, discourse, nuclear energy, Turkey

Procedia PDF Downloads 342
296 Compromising Relevance for Elegance: A Danger of Dominant Growth Models for Backward Economies

Authors: Givi Kupatadze

Abstract:

Backward economies are facing a challenge of achieving sustainable high economic growth rate. Dominant growth models represent a roadmap in framing economic development strategy. This paper examines a relevance of the dominant growth models for backward economies. Cobb-Douglas production function, the Harrod-Domar model of economic growth, the Solow growth model and general formula of gross domestic product are examined to undertake a comprehensive study of the dominant growth models. Deductive research method allows to uncover major weaknesses of the dominant growth models and to come up with practical implications for economic development strategy. The key finding of the paper shows, contrary to what used to be taught by textbooks of economics, that constant returns to scale property of the dominant growth models are a mere coincidence and its generalization over space and time can be regarded as one of the most unfortunate mistakes in the whole field of political economy. The major suggestion of the paper for backward economies is that understanding and considering taxonomy of economic activities based on increasing and diminishing returns to scale represent a cornerstone of successful economic development strategy.

Keywords: backward economies, constant returns to scale, dominant growth models, taxonomy of economic activities

Procedia PDF Downloads 363
295 Communication Experience and the Perception of Media Richness among Parents Working Overseas and Their Children Left-behind in the Philippines

Authors: Dennis Caasi

Abstract:

This study analyzed four knowledge-building elements of channel expansion theory namely: communication media, communication content, communication partner, and communication influence vis-à- vis media richness dimensions among parents working overseas and their left-behind children in the Philippines. Results reveal that both parents and children consumed four out of six mediated communications tested in this research, spent one to four days a week connecting, between 30 minutes to 3 hours per engagement, and media consumption is dependent on the message content and media literacy of parents. Family, academic, household, and health were the common communication topics and parents dictate which channel to use. All six medium tested received high ratings based on the media richness constructs.

Keywords: channel expansion theory, computer-mediated communication, media richness theory, overseas Filipino worker

Procedia PDF Downloads 331
294 Farm-Women in Technology Transfer to Foster the Capacity Building of Agriculture: A Forecast from a Draught-Prone Rural Setting in India

Authors: Pradipta Chandra, Titas Bhattacharjee, Bhaskar Bhowmick

Abstract:

The foundation of economy in India is primarily based on agriculture while this is the most neglected in the rural setting. More significantly, household women take part in agriculture with higher involvement. However, because of lower education of women they have limited access towards financial decisions, land ownership and technology but they have vital role towards the individual family level. There are limited studies on the institution-wise training barriers with the focus of gender disparity. The main purpose of this paper is to find out the factors of institution-wise training (non-formal education) barriers in technology transfer with the focus of participation of rural women in agriculture. For this study primary and secondary data were collected in the line of qualitative and quantitative approach. Qualitative data were collected by several field visits in the adjacent areas of Seva-Bharati, Seva Bharati Krishi Vigyan Kendra through semi-structured questionnaires. In the next level detailed field surveys were conducted with close-ended questionnaires scored on the seven-point Likert scale. Sample size was considered as 162. During the data collection the focus was to include women although some biasness from the end of respondents and interviewer might exist due to dissimilarity in observation, views etc. In addition to that the heterogeneity of sample is not very high although female participation is more than fifty percent. Data were analyzed using Exploratory Factor Analysis (EFA) technique with the outcome of three significant factors of training barriers in technology adoption by farmers: (a) Failure of technology transfer training (TTT) comprehension interprets that the technology takers, i.e., farmers can’t understand the technology either language barrier or way of demonstration exhibited by the experts/ trainers. (b) Failure of TTT customization, articulates that the training for individual farmer, gender crop or season-wise is not tailored. (c) Failure of TTT generalization conveys that absence of common training methods for individual trainers for specific crops is more prominent at the community level. The central finding is that the technology transfer training method can’t fulfill the need of the farmers under an economically challenged area. The impact of such study is very high in the area of dry lateritic and resource crunch area of Jangalmahal under Paschim Medinipur district, West Bengal and areas with similar socio-economy. Towards the policy level decision this research may help in framing digital agriculture for implementation of the appropriate information technology for the farming community, effective and timely investment by the government with the selection of beneficiary, formation of farmers club/ farm science club etc. The most important research implication of this study lies upon the contribution towards the knowledge diffusion mechanism of the agricultural sector in India. Farmers may overcome the barriers to achieve higher productivity through adoption of modern farm practices. Corporates will be interested in agro-sector through investment under corporate social responsibility (CSR). The research will help in framing public or industry policy and land use pattern. Consequently, a huge mass of rural farm-women will be empowered and farmer community will be benefitted.

Keywords: dry lateritic zone, institutional barriers, technology transfer in India, farm-women participation

Procedia PDF Downloads 363
293 Resolving Conflicts of Constitutional Nature: Inside the Romanian Constitutional Court's Rulings on the Role and Competencies of the Public Authorities

Authors: Marieta Safta

Abstract:

The separation and balance of state powers constitute the basis of the rule of law. Observance of this principle requires framing of public authorities within the limits of competence established by the Constitution and the law, as well as loyal cooperation between them. From this perspective, the attribution of the constitutional courts for settling legal conflicts of a constitutional nature is an important tool for correcting the tendencies of violation of these limits, as well as for identifying solutions for situations that do not find an explicit regulation in the constitutional texts. The present study analyzes the jurisprudence of the Constitutional Court of Romania in the field of legal conflicts of a constitutional nature, revealing, together with the presentation of conflict situations, the vulnerabilities of the constitutional reference texts. It is also highlighted the role of the constitutional courts in the evolution of constitutional law institutions, even in terms of defining and redefining the regime of the forms of government. The conclusion of the study, beyond the subject of legal conflicts of a constitutional nature, bears on the necessity, even more so in this matter, of the certainty of jurisdictional interpretation. This certainty cannot be achieved as long as the interpretation is not authoritative; consequently, the assurance of the effectiveness of constitutional justice constitute a key issue of the rule of law.

Keywords: legal conflicts of constitutional nature, the Constitutional Court of Romania, the separation and balance of powers in the state, the effectiveness of constitutional justice

Procedia PDF Downloads 120
292 Comparative Canadian Online News Coverage Analysis of Sex Trafficking Reported Cases in Ontario, and Nova Scotia

Authors: Alisha Fisher

Abstract:

Sex trafficking is a worldwide crisis that requires trauma-informed and survivor-centered media attention to accurate disseminate information. Much of the previous literature on sex trafficking tends to focus on the frequency of incidents, intervention, and support strategies for survivors, with few of them looking to how the media is conducting their reporting on sex trafficking cases to the public. Utilizing data of reports from the media of cases of sex trafficking in the two Canadian provinces with the highest cases of sex trafficking, Ontario and Nova Scotia, the authors sought to analyze the similarities and differences of how sex trafficking cases were being reported. A total of twenty articles were examined, with ten based within the province of Ontario and the remaining ten from the province of Nova Scotia. The authors coded in two processes, first, who the article was about, and second, the framing and content inclusion. The results suggest that there is high usage and reliance of voices and images of authority, with male people of color being shown as the perpetrators and white women being shown as the survivors. These findings can aid in the expansion of trauma-informed, survivor-centered media literacy of reports of sex trafficking to provide accurate insights and further developing robust methods to intersectional approaches to reporting cases of sex trafficking.

Keywords: sex trafficking, media coverage, Canada sex trafficking, content analysis

Procedia PDF Downloads 180