Search results for: Internet Studies Cyprus University of Technology
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 21238

Search results for: Internet Studies Cyprus University of Technology

21028 Information Seekers vs. Information Providers: New Vistas and New Challenges for the Libraries Today; A Case Study of the Panjab University Library, Chandigarh, India

Authors: Neeru Bhatia

Abstract:

This article presents the results of a case study designed to analyze and deduce Information seekers and the Information Providers in today’s context, wherein we come across a sea of change in the provision of Information services due to the changing electronic environment. The Panjab University Library is one of the biggest libraries of India and was inaugurated in 1963 by Pt. Jawaharlal Nehru, the then Prime Minister of India. The library always thrives to assimilate new technology for the provision of Information services. As we know that the Information seekers today are a whole lot different, they are tech savvy, like to be on their electronic gadgets most of the time, and their Information seeking patterns are also different, the challenge that lies before the libraries is to be always ready for these day to day challenges. The study explores the current status of the Information Services being provided by the Panjab University Library (the Information Providers) vs. the evaluation of these Information services by the users of Library (the Information Seekers). The present study aimed at finding out whether Panjab University Library is able to achieve its mission to be an innovative and user-oriented library by exploring all the new vistas and reach up to the expectations of the information seekers by taking up all the challenges being posed by the ever changing technological scenario.

Keywords: electronic environment, information seekers, information providers, new technology

Procedia PDF Downloads 237
21027 An Efficient Mitigation Plan to Encounter Various Vulnerabilities in Internet of Things Enterprises

Authors: Umesh Kumar Singh, Abhishek Raghuvanshi, Suyash Kumar Singh

Abstract:

As IoT networks gain popularity, they are more susceptible to security breaches. As a result, it is crucial to analyze the IoT platform as a whole from the standpoint of core security concepts. The Internet of Things relies heavily on wireless networks, which are well-known for being susceptible to a wide variety of attacks. This article provides an analysis of many techniques that may be used to identify vulnerabilities in the software and hardware associated with the Internet of Things (IoT). In the current investigation, an experimental setup is built with the assistance of server computers, client PCs, Internet of Things development boards, sensors, and cloud subscriptions. Through the use of network host scanning methods and vulnerability scanning tools, raw data relating to IoT-based applications and devices may be collected. Shodan is a tool that is used for scanning, and it is also used for effective vulnerability discovery in IoT devices as well as penetration testing. This article presents an efficient mitigation plan for encountering vulnerabilities in the Internet of Things.

Keywords: internet of things, security, privacy, vulnerability identification, mitigation plan

Procedia PDF Downloads 7
21026 Data Privacy: Stakeholders’ Conflicts in Medical Internet of Things

Authors: Benny Sand, Yotam Lurie, Shlomo Mark

Abstract:

Medical Internet of Things (MIoT), AI, and data privacy are linked forever in a gordian knot. This paper explores the conflicts of interests between the stakeholders regarding data privacy in the MIoT arena. While patients are at home during healthcare hospitalization, MIoT can play a significant role in improving the health of large parts of the population by providing medical teams with tools for collecting data, monitoring patients’ health parameters, and even enabling remote treatment. While the amount of data handled by MIoT devices grows exponentially, different stakeholders have conflicting understandings and concerns regarding this data. The findings of the research indicate that medical teams are not concerned by the violation of data privacy rights of the patients' in-home healthcare, while patients are more troubled and, in many cases, are unaware that their data is being used without their consent. MIoT technology is in its early phases, and hence a mixed qualitative and quantitative research approach will be used, which will include case studies and questionnaires in order to explore this issue and provide alternative solutions.

Keywords: MIoT, data privacy, stakeholders, home healthcare, information privacy, AI

Procedia PDF Downloads 75
21025 The Need for the Inclusion of Museum Studies at All Levels of Education in Nigeria

Authors: Stephany Inalegwu

Abstract:

Museums play a very critical role in understanding the cultural values and the history of any given society in Nigeria and the world at large. The role of Museums as an avenue through which artefacts are collected, preserved and exhibited cannot be over emphasized as they are now seen as not only with the above stated aims but also as a creator of employment and revenue generation if properly harnessed. Interestingly, despite its importance, museum studies have been limited to University curriculum alone causing a dearth of information for the younger generation up until they attain the University age. It is against this background that this paper carefully analyses the definitions of museums, the state of museums and museum studies in Nigeria today and the need to include its studies at all the levels of Education in Nigeria from the primary, to secondary and tertiary levels. It should reflect a study of all ages, as this is vital in the development of individuals. It concludes by harping on the need for a better appreciation of the Nigerian culture ranging from the famous Nok Terracotta, Benin Bronze works etc and its importance of museums as an avenue to display the rich Nigerian cultural heritage.

Keywords: culture, curriculum, education, museum

Procedia PDF Downloads 178
21024 Analyzing the Perception of Students and Faculty Members on Social Media Use in Academic Activities: A Case Study of Beijing Normal University

Authors: Mcjerry A. Bekoe, Emile Uwamahoro

Abstract:

Social media has become the order of the day, in particular among the youth. It is widely used both formally and informally in the university communities with varied definitions both in the academic circles and in the public domain. In simple terms, it is a media upon which social interactions are carried. In this work social media denote mobile phones, and web-base applications use by students and institutions to construct, partake, and distribute both existing and new information in a digital setting through internet communication. The basic aim of conducting this study was to analyze the perception of students and faculty members Beijing Normal University on social media use in the academic setting and to contribute to the understanding of how university students use social media, the advantages and disadvantages of social media in education. The study was qualitative and employed open-ended interview questions developed to seek students’ perception of the effects of social media and administered based on purposive sampling. Document analysis was also done because of triangulation to ensure validity and reliability. The results show there are positive and negative impacts of social media use depending on how one uses it. Social media have the capability to become a priceless asset to aid their educational communication.

Keywords: academics, high education, interactions, social media

Procedia PDF Downloads 313
21023 Undergraduate Students’ Learning Experience and Practices in Multilingual Higher Education Institutions: The Case of the University of Luxembourg

Authors: Argyro Maria Skourmalla

Abstract:

The present paper draws on the example of the University of Luxembourg as a multilingual and international setting. The University of Luxembourg, which is located between France, Germany, and Belgium, has adopted a new multilingualism policy in 2020, establishing English, French, German, and Luxembourgish as the official languages of the Institution. With around 7.000 students, more than half of which are international students, the University is a meeting point for languages and cultures. This paper includes data from an online survey that with undergraduate students from different disciplines at the University of Luxembourg. Students shared their personal experience and opinions regarding language use in this higher education context, as well as practices they use in learning in this multilingual context. Findings show the role of technology in assisting students in different aspects of learning this multilingual context. At the same time, more needs to be done to avoid an exclusively monolingual paradigm in higher education. Findings also show that some languages remain ‘unseen’ in this context. Overall, even though linguistic diversity in this University is seen as an asset, a lot needs to be done towards the recognition of staff and students’ linguistic repertoires for inclusion and education equity.

Keywords: higher education, learning, linguistic diversity, multilingual practices

Procedia PDF Downloads 35
21022 Ecosystems: An Analysis of Generation Z News Consumption, Its Impact on Evolving Concepts and Applications in Journalism

Authors: Bethany Wood

Abstract:

The world pandemic led to a change in the way social media was used by audiences, with young people spending more hours on the platform due to lockdown. Reports by Ofcom have demonstrated that the internet is the second most popular platform for accessing news after television in the UK with social media and the internet ranked as the most popular platform to access news for those aged between 16-24. These statistics are unsurprising considering that at the time of writing, 98 percent of Generation Z (Gen Z) owned a smartphone and the subsequent ease and accessibility of social media. Technology is constantly developing and with this, its importance is becoming more prevalent with each generation: the Baby Boomers (1946-1964) consider it something useful whereas millennials (1981-1997) believe it a necessity for day to day living. Gen Z, otherwise known as the digital native, have grown up with this technology at their fingertips and social media is a norm. It helps form their identity, their affiliations and opens gateways for them to engage with news in a new way. It is a common misconception that Gen Z do not consume news, they are simply doing so in a different way to their predecessors. Using a sample of 800 18-20 year olds whilst utilising Generational theory, Actor Network Theory and the Social Shaping of Technology, this research provides a critical analyse regarding how Gen Z’s news consumption and engagement habits are developing along with technology to sculpture the future format of news and its distribution. From that perspective, allied with the empirical approach, it is possible to provide research orientated advice for the industry and even help to redefine traditional concepts of journalism.

Keywords: journalism, generation z, digital, social media

Procedia PDF Downloads 45
21021 Smart Airport: Application of Internet of Things for Confronting Airport Challenges

Authors: Ali Safaeianpour, Nima Shamandi

Abstract:

As air traffic expands, many airports have evolved into transit centers for people, information, and commerce, and technology implementation is an absolute part of airport development. Several challenges are in the way of implementing technology in an airport. Airport 4.0 proposes the "Smart Airport" concept, which focuses on using modern technologies such as Big Data, the Internet of Things (IoT), advanced biometric systems, blockchain, and cloud computing to alter and enhance passengers' journeys. Several common IoT concrete topics as partial keys to smart airports are discussed and introduced, ranging from automated check-in systems to exterior tracking processes, with the goal of enlightening more and more insightful ideas and proposals about smart airport solutions. IoT will dramatically alter people's lives by infusing intelligence, boosting the quality of life, and assembling it smarter. This paper reviews the approaches to transforming an airport into a smart airport and describes several enabling components of IoT and challenges that can hinder the implementation of a smart airport's function, which require to be addressed.

Keywords: airport 4.0, digital airport, smart airport, IoT

Procedia PDF Downloads 84
21020 The Design and Applied of Learning Management System via Social Media on Internet: Case Study of Operating System for Business Subject

Authors: Pimploi Tirastittam, Sawanath Treesathon, Amornrath Ongkawat

Abstract:

Learning Management System (LMS) is the system which uses to manage the learning in order to grouping the content and learning activity between the lecturer and learner including online examination and evaluation. Nowadays, it is the borderless learning era so the learning activities can be accessed from everywhere in the world and also anytime via the information technology and media. The learner can easily access to the knowledge so the different in time and distance is not a constraint for learning anymore. The learning pattern which was used in this research is the integration of the in-class learning and online learning via internet and will be able to monitor the progress by the Learning management system which will create the fast response and accessible learning process via the social media. In order to increase the capability and freedom of the learner, the system can show the current and history of the learning document, video conference and also has the chat room for the learner and lecturer to interact to each other. So the objectives of the “The Design and Applied of Learning Management System via Social Media on Internet: Case Study of Operating System for Business Subject” are to expand the opportunity of learning and to increase the efficiency of learning as well as increase the communication channel between lecturer and student. The data of this research was collect from 30 users of the system which are students who enroll in the subject. And the result of the research is in the “Very Good” which is conformed to the hypothesis.

Keywords: Learning Management System, social media, Operating System, information technology

Procedia PDF Downloads 319
21019 Net Regularity and Its Ethical Implications on Internet Stake Holders

Authors: Nourhan Elshenawi

Abstract:

Net Neutrality (NN) is the principle of treating all online data the same without any prioritization of some over others. A research gap in current scholarship about “violations of NN” and the subsequent ethical concerns paves the way for the following research question: To what extent violations of NN entail ethical concerns and implications for Internet stakeholders? To answer this question, NR is examined using the two major action-based ethical theories, Kantian and Utilitarian, across the relevant Internet stakeholders. First some necessary IT background is provided that shapes how the Internet works and who the key stakeholders are. Following the IT background, the relationship between the stakeholders, users, Internet Service Providers (ISPs) and content providers is discussed and illustrated. Then some violations of NN that are currently occurring is covered, without attracting any attention from the general public from an ethical perspective, as a new term Net Regularity (NR). Afterwards, the current scholarship on NN and its violations are discussed, that are mainly from an economic and sociopolitical perspectives to highlight the lack of ethical discussions on the issue. Before moving on to the ethical analysis however, websites are presented as digital entities that are affected by NR and their happiness is measured using functionalism. The analysis concludes that NR is prone to an unethical treatment of Internet stakeholders in the perspective of both theories. Finally, the current Digital Divide in the world is presented to be able to better illustrate the implications of NR. The implications present the new Internet divide that will take place between individuals within society. Through answering the research question using ethical analysis, it attempts to shed some light on the issue of NR and what kind of society it would lead to. NR would not just lead to a divided society, but divided individuals that are separated by something greater than distance, the Internet.

Keywords: digital divide, digital entities, digital ontology, internet ethics, internet law, net neutrality, internet service providers, websites as beings

Procedia PDF Downloads 240
21018 Analysis of Methodological Issues in the Study of Digital Library Services: A Case Study of Nigeria University Systems

Authors: Abdulmumin Isah

Abstract:

Over the years, researchers have employed different approaches in the study of usage of library services in the traditional library system, such approaches have provided explanations on the users’ perception, attitude, and usage of library services. Findings of such studies which often employed survey research approach have guided librarians and library stakeholders in their drive to improve library services to patrons. However, with the advent of digital library services, librarians and information science researchers have been experiencing methodological issues in the study of digital library services. While some quantitative approaches have been employed to understand adoption and usage of digital library services, conflicting results from such studies have increased the need to employ qualitative approaches. The appropriateness of the qualitative approaches has also been questioned. This study intends to review methodological approaches in the studies of digital libraries and provides a framework for the selection of appropriate research approach for the study of digital libraries using Nigerian university systems as case study.

Keywords: digital library, university library, methodological issues, research approaches, quantitative, qualitative, Nigeria

Procedia PDF Downloads 461
21017 Cybercrimes in Nigeria: Its Causes, Effects and Solutions

Authors: Uzoma Igboji

Abstract:

Cybercrimes involves crimes committed on the internet using the computer as a tool or targeted victim. In Nigeria today, there are many varieties of crimes that are committed on the internet daily, some are directed to the computers while the others are directed to the computer users. Cyber terrorism, identity theft, internet chat room, piracy and hacking are identified as types of cyber crimes. Usually, these crimes are perpetrated in forms of like sending of fraudulent and bogus financial proposals from cyber crimes to innocent internet users. The increasing rates of cyber crimes have become strong threats to the society, organizations and country’s reputation, E-commerce growth, denial of innocent Nigerian opportunity abroad and reduced productivity. This study identified some of the causes of cybercrimes to include urbanization, high rate of unemployment, corruption, easy accessibility to internet and weak implementation of cyber crimes in Nigeria. Therefore, internet users should inculcate the habit of continuously updating their knowledge about the ever changing ICTs through this, they can be well informed about the current trends in cybercrimes and how the cybercrimes carryout their dubious activities. Thus, how they can devise means of protecting their information from cyber criminals. Internet users should be security conscious at all times .Recommendations were proposed on how these crimes can be minimized if not completely eradicated.

Keywords: cyber-crimes, cyber-terrorism, cyber-criminals, Nigeria

Procedia PDF Downloads 498
21016 Internet Use, Social Networks, Loneliness and Quality of Life among Adults Aged 50 and Older: Mediating and Moderating Effects

Authors: Rabia Khaliala, Adi Vitman-Schorr

Abstract:

Background: The increase in longevity of people on one hand, and on the other hand the fact that the social networks in later life become increasingly narrower, highlight the importance of Internet use to enhance quality of life (QoL). However, whether Internet use increases or decreases social networks, loneliness and quality of life is not clear-cut. Purposes: To explore the direct and/or indirect effects of Internet use on QoL, and to examine whether ethnicity and time the elderly spent with family moderate the mediation effect of Internet use on quality of life throughout loneliness. Methods: This descriptive-correlational study was carried out in 2016 by structured interviews with a convenience sample of 502 respondents aged 50 and older, living in northern Israel. Bootstrapping with resampling strategies was used for testing mediation a model. Results: Use of the Internet was found to be positively associated with QoL. However, this relationship was mediated by loneliness, and moderated by the time the elderly spent with family members. In addition, respondents' ethnicity significantly moderated the mediation effect between Internet use and loneliness. Conclusions: Internet use can enhance QoL of older adults directly or indirectly by reducing loneliness. However, these effects are conditional on other variables. The indirect effect moderated by ethnicity, and the direct effect moderated by the time the elderly spend with their families. Researchers and practitioners should be aware of these interactions which can impact loneliness and quality of life of older persons differently.

Keywords: internet use, loneliness, quality of life, social contacts

Procedia PDF Downloads 150
21015 The Study of Thai Consumer Behavior toward Buying Goods on the Internet

Authors: Pichamon Chansuchai

Abstract:

The study of Thai consumer behavior toward buying goods on the Internet is a survey research. The five-level rating scale and open-ended questionnaire are applied for this research procedure, which has more than 400 random sampling of Thai people aged between 15-40 years old. The summary findings are: The analysis of respondents profile were female 55.3% and male 44.8% , 35.3% aged between 20-30 years old, had been employed 29.5% with average income up to 11,000 baht/month 50.2% and expenditure more than 11,000 baht per month 29.3%. The internet usage behavior of respondents mostly found that objectives of the internet usage are: 1) Communication 93.3% 2) the categories of websites usage was trading 42.8% 3) The marketing mix effected to trading behavior via internet which can be analyzed in term of marketing factor as following: Product focused on product quality was the most influenced factor with average value 4.75. The cheaper price than overview market was the most effect factor to internet shopping with mean value 4.53. The average value 4.67 of the available place that could reduce spending time for shopping. The effective promotion of the buy 1 get 1 was the stimulus factor for internet shopping with mean value 4.60. For hypothesis testing, the different sex has relationship with buying decision. It presented that male and female have vary purchasing decision via internet with value of significant difference 0.05. Furthermore, the variety occupations of respondents related to the use of selected type of website. It also found that the vary of personal occupation effected to the type of website selection dissimilar with value of significant difference 0.05.

Keywords: behavior, internet, consumer, goods

Procedia PDF Downloads 220
21014 The Internet of Things: A Survey of Authentication Mechanisms, and Protocols, for the Shifting Paradigm of Communicating, Entities

Authors: Nazli Hardy

Abstract:

Multidisciplinary application of computer science, interactive database-driven web application, the Internet of Things (IoT) represents a digital ecosystem that has pervasive technological, social, and economic, impact on the human population. It is a long-term technology, and its development is built around the connection of everyday objects, to the Internet. It is estimated that by 2020, with billions of people connected to the Internet, the number of connected devices will exceed 50 billion, and thus IoT represents a paradigm shift in in our current interconnected ecosystem, a communication shift that will unavoidably affect people, businesses, consumers, clients, employees. By nature, in order to provide a cohesive and integrated service, connected devices need to collect, aggregate, store, mine, process personal and personalized data on individuals and corporations in a variety of contexts and environments. A significant factor in this paradigm shift is the necessity for secure and appropriate transmission, processing and storage of the data. Thus, while benefits of the applications appear to be boundless, these same opportunities are bounded by concerns such as trust, privacy, security, loss of control, and related issues. This poster and presentation look at a multi-factor authentication (MFA) mechanisms that need to change from the login-password tuple to an Identity and Access Management (IAM) model, to the more cohesive to Identity Relationship Management (IRM) standard. It also compares and contrasts messaging protocols that are appropriate for the IoT ecosystem.

Keywords: Internet of Things (IoT), authentication, protocols, survey

Procedia PDF Downloads 272
21013 Forecasting Future Society to Explore Promising Security Technologies

Authors: Jeonghwan Jeon, Mintak Han, Youngjun Kim

Abstract:

Due to the rapid development of information and communication technology (ICT), a substantial transformation is currently happening in the society. As the range of intelligent technologies and services is continuously expanding, ‘things’ are becoming capable of communicating one another and even with people. However, such “Internet of Things” has the technical weakness so that a great amount of such information transferred in real-time may be widely exposed to the threat of security. User’s personal data are a typical example which is faced with a serious security threat. The threats of security will be diversified and arose more frequently because next generation of unfamiliar technology develops. Moreover, as the society is becoming increasingly complex, security vulnerability will be increased as well. In the existing literature, a considerable number of private and public reports that forecast future society have been published as a precedent step of the selection of future technology and the establishment of strategies for competitiveness. Although there are previous studies that forecast security technology, they have focused only on technical issues and overlooked the interrelationships between security technology and social factors are. Therefore, investigations of security threats in the future and security technology that is able to protect people from various threats are required. In response, this study aims to derive potential security threats associated with the development of technology and to explore the security technology that can protect against them. To do this, first of all, private and public reports that forecast future and online documents from technology-related communities are collected. By analyzing the data, future issues are extracted and categorized in terms of STEEP (Society, Technology, Economy, Environment, and Politics), as well as security. Second, the components of potential security threats are developed based on classified future issues. Then, points that the security threats may occur –for example, mobile payment system based on a finger scan technology– are identified. Lastly, alternatives that prevent potential security threats are proposed by matching security threats with points and investigating related security technologies from patent data. Proposed approach can identify the ICT-related latent security menaces and provide the guidelines in the ‘problem – alternative’ form by linking the threat point with security technologies.

Keywords: future society, information and communication technology, security technology, technology forecasting

Procedia PDF Downloads 440
21012 Machine Learning Model Applied for SCM Processes to Efficiently Determine Its Impacts on the Environment

Authors: Elena Puica

Abstract:

This paper aims to investigate the impact of Supply Chain Management (SCM) on the environment by applying a Machine Learning model while pointing out the efficiency of the technology used. The Machine Learning model was used to derive the efficiency and optimization of technology used in SCM and the environmental impact of SCM processes. The model applied is a predictive classification model and was trained firstly to determine which stage of the SCM has more outputs and secondly to demonstrate the efficiency of using advanced technology in SCM instead of recuring to traditional SCM. The outputs are the emissions generated in the environment, the consumption from different steps in the life cycle, the resulting pollutants/wastes emitted, and all the releases to air, land, and water. This manuscript presents an innovative approach to applying advanced technology in SCM and simultaneously studies the efficiency of technology and the SCM's impact on the environment. Identifying the conceptual relationships between SCM practices and their impact on the environment is a new contribution to the research. The authors can take a forward step in developing recent studies in SCM and its effects on the environment by applying technology.

Keywords: machine-learning model in SCM, SCM processes, SCM and the environmental impact, technology in SCM

Procedia PDF Downloads 88
21011 Investigating Elements That Influence Higher Education Institutions’ Digital Maturity

Authors: Zarah M. Bello, Nathan Baddoo, Mariana Lilley, Paul Wernick

Abstract:

In this paper, we present findings from a multi-part study to evaluate candidate elements reflecting the level of digital capability maturity (DCM) in higher education and the relationship between these elements. We will use these findings to propose a model of DCM for educational institutions. We suggest that the success of learning in higher education is dependent in part on the level of maturity of digital capabilities of institutions as well as the abilities of learners and those who support the learning process. It is therefore important to have a good understanding of the elements that underpin this maturity as well as their impact and interactions in order to better exploit the benefits that technology presents to the modern learning environment and support its continued improvement. Having identified ten candidate elements of digital capability that we believe support the level of a University’s maturity in this area as well as a number of relevant stakeholder roles, we conducted two studies utilizing both quantitative and qualitative research methods. In the first of these studies, 85 electronic questionnaires were completed by various stakeholders in a UK university, with a 100% response rate. We also undertook five in-depth interviews with management stakeholders in the same university. We then utilized statistical analysis to process the survey data and conducted a textual analysis of the interview transcripts. Our findings support our initial identification of candidate elements and support our contention that these elements interact in a multidimensional manner. This multidimensional dynamic suggests that any proposal for improvement in digital capability must reflect the interdependency and cross-sectional relationship of the elements that contribute to DCM. Our results also indicate that the notion of DCM is strongly data-centric and that any proposed maturity model must reflect the role of data in driving maturity and improvement. We present these findings as a key step towards the design of an operationalisable DCM maturity model for universities.

Keywords: digital capability, elements, maturity, maturity framework, university

Procedia PDF Downloads 115
21010 An Investigation into Enablers and Barriers of Reverse Technology Transfer

Authors: Nirmal Kundu, Chandan Bhar, Visveswaran Pandurangan

Abstract:

Technology is the most valued possession for a country or an organization. The economic development depends not on stock of technology but on the capabilities how the technology is being exploited. The technology transfer is the best way how the developing countries have an access to state-of- the-art technology. Traditional technology transfer is a unidirectional phenomenon where technology is transferred from developed to developing countries. But now there is a change of wind. There is a general agreement that global shift of economic power is under way from west to east. As China and India are making the transition from users to producers, and producers to innovators, this has increasing important implications on economy, technology and policy of global trade. As a result, Reverse technology transfer has become a phenomenon and field of study in technology management. The term “Reverse Technology Transfer” is not well defined. Initially the concept of Reverse technology transfer was associated with the phenomenon of “Brain drain” from developing to developed countries. In the second phase, Reverse Technology Transfer was associated with the transfer of knowledge and technology from subsidiaries to multinationals. Finally, time has come now to extend the concept of reverse technology transfer to two different organizations or countries related or unrelated by traditional technology transfer but the transfer or has essentially received the technology through traditional mode of technology transfer. The objective of this paper is to study; 1) the present status of Reverse technology transfer, 2) the factors which are the enablers and barriers of Reverse technology transfer and 3) how the reverse technology transfer strategy can be integrated in the technology policy of a country which will give the countries an economic boost. The research methodology used in this study is a combination of literature review, case studies and key informant interviews. The literature review includes both published as well as unpublished sources of literature. In case study, attempt has been made to study the records of reverse technology transfer that have been occurred in developing countries. In case of key informant interviews, informal telephonic discussions have been carried out with the key executives of the organizations (industry, university and research institutions) who are actively engaged in the process of technology transfer- traditional as well as reverse. Reverse technology transfer is possible only by creating technological capabilities. Following four important enablers coupled with government active and aggressive action can help to build technology base to reach to the goal of Reverse technology transfer 1) Imitation to innovation, 2) Reverse engineering, 3) Collaborative R & D approach, and 4) Preventing reverse brain drain. The barriers that come in the way are the mindset of over dependence, over subordination and parent–child attitude (not adult attitude). Exploitation of these enablers and overcoming the barriers of reverse technology transfer, the developing countries like India and China can prove that going “reverse” is the best way to move forward and again establish themselves as leader of the future world.

Keywords: barriers of reverse technology transfer, enablers of reverse technology transfer, knowledge transfer, reverse technology transfer, technology transfer

Procedia PDF Downloads 371
21009 Secure Authentication Scheme Based on Numerical Series Cryptography for Internet of Things

Authors: Maha Aladdin, Khaled Nagaty, Abeer Hamdy

Abstract:

The rapid advancement cellular networks and wireless networks have laid a solid basis for the Internet of Things. IoT has evolved into a unique standard that allows diverse physical devices to collaborate with one another. A service provider gives a variety of services that may be accessed via smart apps anywhere, at any time, and from any location over the Internet. Because of the public environment of mobile communication and the Internet, these services are highly vulnerable to a several malicious attacks, such as unauthorized disclosure by hostile attackers. As a result, the best option for overcoming these vulnerabilities is a strong authentication method. In this paper, a lightweight authentication scheme that is based on numerical series cryptography is proposed for the IoT environments. It allows mutual authentication between IoT devices Parametric study and formal proofs are utilized to illustrate that the pro-posed approach is resistant to a variety of security threats.

Keywords: internet of things, authentication, cryptography, security protocol

Procedia PDF Downloads 81
21008 Translation in Greek and Psychometric Properties of the 9-Item Internet Gaming Disorder Scale-Short Form (IGDS9-Sf)

Authors: Aspasia Simpsi

Abstract:

The aim of this study was to translate into Greek and then validate the psychometric properties of the Internet Gaming Disorder Scale–Short-Form (IGDS9-SF) (Pontes & Griffiths, 2015). This is the first short standardized psychometric tool to assess Internet Gaming Disorder (IGD) according to the DSM-V nine clinical criteria and among the most frequently examined. The translation of the test was done through the process of back-translation. To gain a better insight into the psychometric properties of this test, the questionnaire included demographic questions and the Greek version of the Internet Addiction Test (Young, 1998). The participants of the study were 241 adolescents aged between 12 to 18. They were nationally recruited in Greece through an online survey that was hosted on the platform of Qualtrics. Analysis revealed excellent reliability with Cronbach’s alpha coefficients α = .939 for IGDS9-SF and α = .940 for IAT. The use of Pearson product-moment correlation revealed a significant positive relationship between IGDS9-SF and IAT r (241) =.45, p < .001. Due to inconsistencies in terminology and tests in the field of IGD, what is recommended for future research is a consensus regarding IGD testing and research.

Keywords: internet gaming disorder, IGDS9-SF, psychometric properties, internet addiction

Procedia PDF Downloads 29
21007 A Review on Cyberchondria Based on Bibliometric Analysis

Authors: Xiaoqing Peng, Aijing Luo, Yang Chen

Abstract:

Background: Cyberchondria, as an "emerging risk" accompanied by the information era, is a new abnormal pattern characterized by excessive or repeated online searches for health-related information and escalating health anxiety, which endangers people's physical and mental health and poses a huge threat to public health. Objective: To explore and discuss the research status, hotspots and trends of Cyberchondria. Methods: Based on a total of 77 articles regarding "Cyberchondria" extracted from Web of Science from the beginning till October 2019, the literature trends, countries, institutions, hotspots are analyzed by bibliometric analysis, the concept definition of Cyberchondria, instruments, relevant factors, treatment and intervention are discussed as well. Results: Since "Cyberchondria" was put forward for the first time in 2001, the last two decades witnessed a noticeable increase in the amount of literature, especially during 2014-2019, it quadrupled dramatically at 62 compared with that before 2014 only at 15, which shows that Cyberchondria has become a new theme and hot topic in recent years. The United States was the most active contributor with the largest publication (23), followed by England (11) and Australia (11), while the leading institutions were Baylor University(7) and University of Sydney(7), followed by Florida State University(4) and University of Manchester(4). The WoS categories "Psychiatry/Psychology " and "Computer/ Information Science "were the areas of greatest influence. The concept definition of Cyberchondria is not completely unified in the world, but it is generally considered as an abnormal behavioral pattern and emotional state and has been invoked to refer to the anxiety-amplifying effects of online health-related searches. The first and the most frequently cited scale for measuring the severity of Cyberchondria called “The Cyberchondria Severity Scale (CSS) ”was developed in 2014, which conceptualized Cyberchondria as a multidimensional construct consisting of compulsion, distress, excessiveness, reassurance, and mistrust of medical professionals which was proved to be not necessary for this construct later. Since then, the Brazilian, German, Turkish, Polish and Chinese versions were subsequently developed, improved and culturally adjusted, while CSS was optimized to a simplified version (CSS-12) in 2019, all of which should be worthy of further verification. The hotspots of Cyberchondria mainly focuses on relevant factors as follows: intolerance of uncertainty, anxiety sensitivity, obsessive-compulsive disorder, internet addition, abnormal illness behavior, Whiteley index, problematic internet use, trying to make clear the role played by “associated factors” and “anxiety-amplifying factors” in the development of Cyberchondria, to better understand the aetiological links and pathways in the relationships between hypochondriasis, health anxiety and online health-related searches. Although the treatment and intervention of Cyberchondria are still in the initial stage of exploration, there are kinds of meaningful attempts to seek effective strategies from different aspects such as online psychological treatment, network technology management, health information literacy improvement and public health service. Conclusion: Research on Cyberchondria is in its infancy but should be deserved more attention. A conceptual consensus on Cyberchondria, a refined assessment tool, prospective studies conducted in various populations, targeted treatments for it would be the main research direction in the near future.

Keywords: cyberchondria, hypochondriasis, health anxiety, online health-related searches

Procedia PDF Downloads 99
21006 Pavement Quality Evaluation Using Intelligent Compaction Technology: Overview of Some Case Studies in Oklahoma

Authors: Sagar Ghos, Andrew E. Elaryan, Syed Ashik Ali, Musharraf Zaman, Mohammed Ashiqur Rahman

Abstract:

Achieving desired density during construction is an important indicator of pavement quality. Insufficient compaction often compromises pavement performance and service life. Intelligent compaction (IC) is an emerging technology for monitoring compaction quality during the construction of asphalt pavements. This paper aims to provide an overview of findings from four case studies in Oklahoma involving the compaction quality of asphalt pavements, namely SE 44th St project (Project 1) and EOC Turnpike project (Project 2), Highway 92 project (Project 3), and 108th Avenue project (Project 4). For this purpose, an IC technology, the intelligent compaction analyzer (ICA), developed at the University of Oklahoma, was used to evaluate compaction quality. Collected data include GPS locations, roller vibrations, roller speed, the direction of movement, and temperature of the asphalt mat. The collected data were analyzed using a widely used software, VETA. The average densities for Projects 1, 2, 3 and 4, were found as 89.8%, 91.50%, 90.7% and 87.5%, respectively. The maximum densities were found as 94.6%, 95.8%, 95.9%, and 89.7% for Projects 1, 2, 3, and 4, respectively. It was observed that the ICA estimated densities correlated well with the field core densities. The ICA results indicated that at least 90% of the asphalt mats were subjected to at least two roller passes. However, the number of passes required to achieve the desired density (94% to 97%) differed from project to project depending on the underlying layer. The results of these case studies show both opportunities and challenges in using IC for monitoring compaction quality during construction in real-time.

Keywords: asphalt pavement construction, density, intelligent compaction, intelligent compaction analyzer, intelligent compaction measure value

Procedia PDF Downloads 126
21005 National Image in the Age of Mass Self-Communication: An Analysis of Internet Users' Perception of Portugal

Authors: L. Godinho, N. Teixeira

Abstract:

Nowadays, massification of Internet access represents one of the major challenges to the traditional powers of the State, among which the power to control its external image. The virtual world has also sparked the interest of social sciences which consider it a new field of study, an immense open text where sense is expressed. In this paper, that immense text has been accessed to so as to understand the perception Internet users from all over the world have of Portugal. Ours is a quantitative and qualitative approach, as we have resorted to buzz, thematic and category analysis. The results confirm the predominance of sea stereotype in others' vision of the Portuguese people, and evidence that national image has adapted to network communication through processes of individuation and paganization.

Keywords: national image, internet, self-communication, perception

Procedia PDF Downloads 236
21004 The Dual Role of the Internet in the Development of Local Communities Through Ecotourism and Cultural Assimilation in Iran

Authors: Haniyeh Sameie

Abstract:

In the process of globalization, geographical boundaries gradually lose their importance, and ethnic, local, and regional cultures are integrated with each other and even marginalized. Globalization has many manifestations and aspects, including economic, political, social, etc., but this paper has focused on the cultural aspect of globalization. From this point of view, one of the important issues that have always been raised is the assimilation of diverse and plural cultures, which are gradually disappearing and destroyed in the onslaught of global culture and are dissolved in global culture. In the postmodern paradigm, the tools of the globalized world can be used to preserve and strengthen cultural diversity. For example, the Internet, as a globalization tool, can play an important role in preserving and recognizing local cultures. In today's world, the world nations and ethnic groups are trying to revive their specific and native cultures in different ways in opposition to the rising cultural assimilation and challenge the globalization of culture. One of the manifestations of these actions is addressing the issue of tourism and, specifically, eco-tourism, which is being developed in Iran as well as in other parts of the world, relying on the powerful tool of globalization, the Internet. Considering the significant growth of the ecotourism industry in Iran in recent years, this paper focuses on the role of the Internet in the development of ecotourism in Iran as one of the manifestations of tourism in recent decades and how to preserve and survive diverse local cultures and strengthen local communities against global culture through it. One of the major challenges in the development of communication technology in Iran in the last decade has been the debate over the necessity or non-necessity of access to high-speed Internet in the villages of Iran. Some believe that accessing the broadband internet in the villages may lead to the disappearance of local cultures and can facilitate the spread of western culture among villagers. On the other hand, the speed of expansion of ecotourism in Iran in the last ten years is owed to the development of the Internet in villages. In this regard, we pay attention to the dual role of the Internet in cultural assimilation and, at the same time, the platform that the online space has created for the growth and development of ecotourism accommodations as a source of stable income for local communities, focusing on the Iranian experience in the recent decade.

Keywords: tourism, globalization, internet, ecotourism in Iran, cultural assimilation

Procedia PDF Downloads 50
21003 The Role of Gender and Socio-Demographics Variables on Food Safety Perceptions of Lebanese University Students

Authors: Lara Hanna-Wakim, Carine El Sokhn

Abstract:

The perception of the consumer in food safety plays an important role in reducing the incidence of foodborne diseases. Studies show that young adults aged between 18 and 25 years are more prone to foodborne illnesses than adults because of their lack of food safety knowledge. The aim of this study was to measure the degree of university students' awareness in food safety, as well as to explore whether there is a relationship or not between the demographic characteristics of university students and their knowledge and practices. A valid questionnaire divided into three parts was distributed to 938 university students, aged between 18-25 years, living alone or with their parents, from different majors and years of study. The data collected was analyzed using the SPSS program. The total scores of the students surveyed were 47.95% on their food safety knowledge and 56.45% on their practices in the matter. The final score of the food safety perception of university students in both genders was 52.2%. Female students scored higher (63.14%) than male students (39.69%), and students majoring in health related fields (67.45%) scored higher than those majoring in areas not related to public health (49.21%). These results showed an overall low level of food safety perception of university students. Educational interventions are needed to improve their food safety knowledge and practices as they will be responsible for their own family one day.

Keywords: food safety, gender, perception, practices, knowledge, lebanese university students

Procedia PDF Downloads 440
21002 Model of Application of Blockchain Technology in Public Finances

Authors: M. Vlahovic

Abstract:

This paper presents a model of public finances, which combines three concepts: participatory budgeting, crowdfunding and blockchain technology. Participatory budgeting is defined as a process in which community members decide how to spend a part of community’s budget. Crowdfunding is a practice of funding a project by collecting small monetary contributions from a large number of people via an Internet platform. Blockchain technology is a distributed ledger that enables efficient and reliable transactions that are secure and transparent. In this hypothetical model, the government or authorities on local/regional level would set up a platform where they would propose public projects to citizens. Citizens would browse through projects and support or vote for those which they consider justified and necessary. In return, they would be entitled to a tax relief in the amount of their monetary contribution. Since the blockchain technology enables tracking of transactions, it can be used to mitigate corruption, money laundering and lack of transparency in public finances. Models of its application have already been created for e-voting, health records or land registries. By presenting a model of application of blockchain technology in public finances, this paper takes into consideration the potential of blockchain technology to disrupt governments and make processes more democratic, secure, transparent and efficient. The framework for this paper consists of multiple streams of research, including key concepts of direct democracy, public finance (especially the voluntary theory of public finance), information and communication technology, especially blockchain technology and crowdfunding. The framework defines rules of the game, basic conditions for the implementation of the model, benefits, potential problems and development perspectives. As an oversimplified map of a new form of public finances, the proposed model identifies primary factors, that influence the possibility of implementation of the model, and that could be tracked, measured and controlled in case of experimentation with the model.

Keywords: blockchain technology, distributed ledger, participatory budgeting, crowdfunding, direct democracy, internet platform, e-government, public finance

Procedia PDF Downloads 126
21001 Location Privacy Preservation of Vehicle Data In Internet of Vehicles

Authors: Ying Ying Liu, Austin Cooke, Parimala Thulasiraman

Abstract:

Internet of Things (IoT) has attracted a recent spark in research on Internet of Vehicles (IoV). In this paper, we focus on one research area in IoV: preserving location privacy of vehicle data. We discuss existing location privacy preserving techniques and provide a scheme for evaluating these techniques under IoV traffic condition. We propose a different strategy in applying Differential Privacy using k-d tree data structure to preserve location privacy and experiment on real world Gowalla data set. We show that our strategy produces differentially private data, good preservation of utility by achieving similar regression accuracy to the original dataset on an LSTM (Long Term Short Term Memory) neural network traffic predictor.

Keywords: differential privacy, internet of things, internet of vehicles, location privacy, privacy preservation scheme

Procedia PDF Downloads 132
21000 To Cloudify or Not to Cloudify

Authors: Laila Yasir Al-Harthy, Ali H. Al-Badi

Abstract:

As an emerging business model, cloud computing has been initiated to satisfy the need of organizations and to push Information Technology as a utility. The shift to the cloud has changed the way Information Technology departments are managed traditionally and has raised many concerns for both, public and private sectors. The purpose of this study is to investigate the possibility of cloud computing services replacing services provided traditionally by IT departments. Therefore, it aims to 1) explore whether organizations in Oman are ready to move to the cloud; 2) identify the deciding factors leading to the adoption or rejection of cloud computing services in Oman; and 3) provide two case studies, one for a successful Cloud provider and another for a successful adopter. This paper is based on multiple research methods including conducting a set of interviews with cloud service providers and current cloud users in Oman; and collecting data using questionnaires from experts in the field and potential users of cloud services. Despite the limitation of bandwidth capacity and Internet coverage offered in Oman that create a challenge in adopting the cloud, it was found that many information technology professionals are encouraged to move to the cloud while few are resistant to change. The recent launch of a new Omani cloud service provider and the entrance of other international cloud service providers in the Omani market make this research extremely valuable as it aims to provide real-life experience as well as two case studies on the successful provision of cloud services and the successful adoption of these services.

Keywords: cloud computing, cloud deployment models, cloud service models, deciding factors

Procedia PDF Downloads 260
20999 Research on the Evaluation of Enterprise-University-Research Cooperation Ability in Hubei Province

Authors: Dongfang Qiu, Yilin Lu

Abstract:

The measurement of enterprise-university-research cooperative efficiency has important meanings in improving the cooperative efficiency, strengthening the effective integration of regional resource, enhancing the ability of regional innovation and promoting the development of regional economy. The paper constructs the DEA method and DEA-Malmquist productivity index method to research the cooperation efficiency of Hubei by making comparisons with other provinces in China. The study found out the index of technology efficiency is 0.52 and the enterprise-university- research cooperative efficiency is Non-DEA efficient. To realize the DEA efficiency of Hubei province, the amount of 1652.596 R&D employees and 638.368 R&D employees’ full time equivalence should be reduced or 137.89 billion yuan of new products’ sales income be increased. Finally, it puts forward policy recommendations on existing problems to strengthen the standings of the cooperation, realize the effective application of the research results, and improve the level of management of enterprise-university-research cooperation efficiency.

Keywords: cooperation ability, DEA method, enterprise-university-research cooperation, Malmquist efficiency index

Procedia PDF Downloads 359