Search results for: Internet purchases
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1673

Search results for: Internet purchases

473 Using Social Media to Amplify Social Entrepreneurial Message

Authors: Irfan Khairi

Abstract:

It is arguable that today's social media has dramatically redefined human contact, and chiefly because the platforms enable communication opportunities unprecedented. Without question, billions of individuals globally engage in the media, a reality by no means lost on businesses and social entrepreneurs desirous of generating interest in a cause, movement, or other social effort. If, however, the opportunities are immense, so too is the competition. Private persons and entrepreneurial concerns alike virtually saturate the popular sites of Facebook, Twitter, and Instagram, and most are intent on capturing as much external interest as possible. At the same time, however, the social entrepreneur possesses an advantage over the individual concerned only the social aspects of the sites, as they express interests in, and measures applicable to, important causes of which the public at large may be unaware. There is, unfortunately, no single means of assuring success in using the media outlets to generate interest. Nonetheless, a general awareness of how social media sites function, as well as the psychological elements relevant to the functioning, is necessary. It is as important to comprehend basic realities of the platforms and approaches that fail as it is to develop strategy, for the latter relies on knowledge of the former. This awareness in place, the social entrepreneur is then better enabled to determine strategy, in terms of which sites to focus upon and how to most effectively convey their message. What is required is familiarity with the online communities, with attention to the specific advantages each provides. Ultimately, today's social entrepreneur may establish a highly effective platform of promotion and engagement, provided they fully comprehend the social investment necessary for success.

Keywords: social media, marketing, e-commerce, internet business

Procedia PDF Downloads 182
472 The Effects of Prolonged Social Media Use on Student Health: A Focus on Computer Vision Syndrome, Hand Pain, and Headaches and Mental Status

Authors: Augustine Ndudi Egere, Shehu Adamu, Esther Ishaya Solomon

Abstract:

As internet accessibility and smartphones continue to increase in Nigeria, Africa’s most populous country, social media platforms have become ubiquitous, causing students of 18-25 age brackets to spend more time on social media. The research investigated the impact of prolonged social media use on the physical health of students, with a specific focus on computer vision syndrome, hand pain, headaches and mental status. The study adopted a mixed-methods approach combining quantitative surveys to gather statistical data on usage patterns and symptoms, along with qualitative interviews into the experiences and perceptions of medical practitioners concerning cases under study within the geopolitical region. The result was analyzed using Regression analysis. It was observed that there is a significant correlation between social media usage by the students in the study age bracket concerning computer vision syndrome, hand pain, headache and general mental status. The research concluded by providing valuable insights into potential interventions and strategies to mitigate the adverse effects of excessive social media use on student well-being and recommends, among others, that educational institutions, parents, and students themselves collaborate to implement strategies aimed at promoting responsible and balanced use of social media.

Keywords: social media, student health, computer vision syndrome, hand pain, headaches, mental staus

Procedia PDF Downloads 12
471 A Breakthrough Improvement Brought by Taxi-Calling APPs for Taxi Operation Level

Authors: Yuan-Lin Liu, Ye Li, Tian Xia

Abstract:

Taxi-calling APPs have been used widely, while brought both benefits and a variety of issues for the taxi market. Many countries do not know whether the benefits are remarkable than the issues or not. This paper established a comparison between the basic scenario (2009-2012) and a taxi-calling software usage scenario (2012-2015) to explain the impact of taxi-calling APPs. The impacts of taxi-calling APPs illustrated by the comparison results are: 1) The supply and demand distribution is more balanced, extending from the city center to the suburb. The availability of taxi service has been improved in low density areas, thin market attribute has also been improved; 2)The ratio of short distance taxi trip decreased, long distance service increased, the utilization of mileage increased, and the rate of empty decreased; 3) The popularity of taxi-calling APPs was able to reduce the average empty distance, cruise time, empty mileage rate and average times of loading passengers, can also enhance the average operating speed, improve the taxi operating level, and reduce social cost although there are some disadvantages. This paper argues that the taxi industry and government can establish an integrated third-party credit information platform based on credit evaluated by the data of the drivers’ driving behaviors to supervise the drivers. Taxi-calling APPs under fully covered supervision in the mobile Internet environment will become a new trend.

Keywords: taxi, taxi-calling APPs, credit, scenario comparison

Procedia PDF Downloads 228
470 Establishing a Change Management Model for Precision Machinery Industry in Taiwan

Authors: Feng-Tsung Cheng, Shu-Li Wang, Mei-Fang Wu, , Hui-Yu Chuang

Abstract:

Due to the rapid development of modern technology, the widespread usage of the Internet makes business environment changing quickly. In order to be a leader in the global competitive market and to pursuit survive, “changing” becomes an unspoken rules need to follow for the company survival. The purpose of this paper is to build change model by using SWOT, strategy map, and balance scorecard, KPI and change management theory. The research findings indicate that organizational change plan formulated by the case company should require the employee to resist change factors and performance management system issues into consideration and must be set organizational change related programs, such as performance appraisal reward system, consulting and counseling mechanisms programs to improve motivation and reduce staff negative emotions. Then according to the model revised strategy maps and performance indicators proposed in this paper, such as strategy maps add and modify corporate culture, improve internal processes management, increase the growth rate of net income and other strategies. The performance indicators are based on strategy maps new and modified by adding net income growth rate, to achieve target production rate, manpower training achievement rates and other indicators, through amendments to achieve the company’s goal, be a leading brand of precision machinery industry.

Keywords: organizational change, SWOT analysis, strategy maps, performance indicators

Procedia PDF Downloads 256
469 The Effects of Negative Electronic Word-of-Mouth and Webcare on Thai Online Consumer Behavior

Authors: Pongsatorn Tantrabundit, Lersak Phothong, Ong-art Chanprasitchai

Abstract:

Due to the emergence of the Internet, it has extended the traditional Word-of-Mouth (WOM) to a new form called “Electronic Word-of-Mouth (eWOM).” Unlike traditional WOM, eWOM is able to present information in various ways by applying different components. Each eWOM component generates different effects on online consumer behavior. This research investigates the effects of Webcare (responding message) from product/ service providers on negative eWOM by applying two types of products (search and experience). The proposed conceptual model was developed based on the combination of the stages in consumer decision-making process, theory of reasoned action (TRA), theory of planned behavior (TPB), the technology acceptance model (TAM), the information integration theory and the elaboration likelihood model. The methodology techniques used in this study included multivariate analysis of variance (MANOVA) and multiple regression analysis. The results suggest that Webcare does slightly increase Thai online consumer’s perceptions on perceived eWOM trustworthiness, information diagnosticity and quality. For negative eWOM, we also found that perceived eWOM Trustworthiness, perceived eWOM diagnosticity and quality have a positive relationship with eWOM influence whereas perceived valence has a negative relationship with eWOM influence in Thai online consumers.

Keywords: consumer behavior, electronic word-of-mouth, online review, online word-of-mouth, Thai online consumer, webcare

Procedia PDF Downloads 180
468 A Methodology for Automatic Diversification of Document Categories

Authors: Dasom Kim, Chen Liu, Myungsu Lim, Su-Hyeon Jeon, ByeoungKug Jeon, Kee-Young Kwahk, Namgyu Kim

Abstract:

Recently, numerous documents including unstructured data and text have been created due to the rapid increase in the usage of social media and the Internet. Each document is usually provided with a specific category for the convenience of the users. In the past, the categorization was performed manually. However, in the case of manual categorization, not only can the accuracy of the categorization be not guaranteed but the categorization also requires a large amount of time and huge costs. Many studies have been conducted towards the automatic creation of categories to solve the limitations of manual categorization. Unfortunately, most of these methods cannot be applied to categorizing complex documents with multiple topics because the methods work by assuming that one document can be categorized into one category only. In order to overcome this limitation, some studies have attempted to categorize each document into multiple categories. However, they are also limited in that their learning process involves training using a multi-categorized document set. These methods therefore cannot be applied to multi-categorization of most documents unless multi-categorized training sets are provided. To overcome the limitation of the requirement of a multi-categorized training set by traditional multi-categorization algorithms, we previously proposed a new methodology that can extend a category of a single-categorized document to multiple categorizes by analyzing relationships among categories, topics, and documents. In this paper, we design a survey-based verification scenario for estimating the accuracy of our automatic categorization methodology.

Keywords: big data analysis, document classification, multi-category, text mining, topic analysis

Procedia PDF Downloads 243
467 The Holistic Nursing WebQuest: An Interactive Teaching/Learning Strategy

Authors: Laura M. Schwarz

Abstract:

WebQuests are an internet-based interactive teaching/learning tool and utilize a scaffolded methodology. WebQuests employ critical thinking, afford inquiry-based constructivist learning, and readily employ Bloom’s Taxonomy. WebQuests have generally been used as instructional technology tools in primary and secondary education and have more recently grown in popularity in higher education. The study of the efficacy of WebQuests as an instructional approach to learning, however, has been limited, particularly in the nursing education arena. The purpose of this mixed-methods study was to determine nursing students’ perceptions of the effectiveness of the Nursing WebQuest as a teaching/learning strategy for holistic nursing-related content. Quantitative findings (N=42) suggested that learners were active participants, used reflection, thought of new ideas, used analysis skills, discovered something new, and assessed the worth of something while taking part in the WebQuests. Qualitative findings indicated that participants found WebQuest positives as easy to understand and navigate; clear and organized; interactive; good alternative learning format, and used a variety of quality resources. Participants saw drawbacks as requiring additional time and work; and occasional failed link or link causing them to lose their location in the WebQuest. Recommendations include using larger sample size and more diverse populations from various programs and universities. In conclusion, WebQuests were found to be an effective teaching/learning tool as positively assessed by study participants.

Keywords: holistic nursing, nursing education, teaching/learning strategy, WebQuests

Procedia PDF Downloads 106
466 Proposal Method of Prediction of the Early Stages of Dementia Using IoT and Magnet Sensors

Authors: João Filipe Papel, Tatsuji Munaka

Abstract:

With society's aging and the number of elderly with dementia rising, researchers have been actively studying how to support the elderly in the early stages of dementia with the objective of allowing them to have a better life quality and as much as possible independence. To make this possible, most researchers in this field are using the Internet Of Things to monitor the elderly activities and assist them in performing them. The most common sensor used to monitor the elderly activities is the Camera sensor due to its easy installation and configuration. The other commonly used sensor is the sound sensor. However, we need to consider privacy when using these sensors. This research aims to develop a system capable of predicting the early stages of dementia based on monitoring and controlling the elderly activities of daily living. To make this system possible, some issues need to be addressed. First, the issue related to elderly privacy when trying to detect their Activities of Daily Living. Privacy when performing detection and monitoring Activities of Daily Living it's a serious concern. One of the purposes of this research is to achieve this detection and monitoring without putting the privacy of the elderly at risk. To make this possible, the study focuses on using an approach based on using Magnet Sensors to collect binary data. The second is to use the data collected by monitoring Activities of Daily Living to predict the early stages of Dementia. To make this possible, the research team suggests developing a proprietary ontology combined with both data-driven and knowledge-driven.

Keywords: dementia, activity recognition, magnet sensors, ontology, data driven and knowledge driven, IoT, activities of daily living

Procedia PDF Downloads 71
465 Influences on Female Gender Identity and Role in Pre-School, Saudi Arabian: Analyzing Children's Perspectives through Narratives and Teachers' Pedagogies

Authors: Mona Alzahrani

Abstract:

Microworld theories can help to define the many influences on female development. In this research, theories together with narratives have been used to discover the reality of children’s gender perceptions in Saudi Arabia. Today, Saudi Arabia is considered a ‘closed and conserved’ society due to tribal, cultural and religious factors. This study focuses on how young girls in Saudi Arabia learn about what is expected of them as females. Cultural beliefs and experiences contribute to children’s notions of identity. Moreover, significant others such as more experienced peers, teachers, parents, and other members of a society can influence a child’s development of knowledge through interactions within their social world. There are dominant influences from the Saudi State. These influences have very strong devices and perceptions of what or how a female should act and be. However, children may have other viewpoints, as it also needs to be considered that the Internet and other media sources could have an influence. Consequently, difficulties could exist for these young children to feel an authentic sense of belonging. The study gathered data using a multi-method approach that elicited the perspectives of the children using ‘multiple modes of expression’ such as observations, story-telling, picture prompt cards, group interviews, drawings and annotations. For this study, prompts and a book was devised, specifically, for use in a Saudi setting. It was found that Saudi young girls in preschool were heteronomous, mainly influenced by culture and society, in their perceptions of female gender and role.

Keywords: Saudi Arabia, pre-school, female, teachers, gender, identity, role

Procedia PDF Downloads 130
464 The Role of Online Social Networks in Social Movements: Social Polarization and Violations against Social Unity and Privacy of Individuals in Turkey

Authors: Tolga Yazıcı

Abstract:

As a matter of the fact that online social networks like Twitter, Facebook and MySpace have experienced an extensive growth in recent years. Social media offers individuals with a tool for communicating and interacting with one another. These social networks enable people to stay in touch with other people and express themselves. This process makes the users of online social networks active creators of content rather than being only consumers of traditional media. That’s why millions of people show strong desire to learn the methods and tools of digital content production and necessary communication skills. However, the booming interest in communication and interaction through online social networks and high level of eagerness to invent and implement the ways to participate in content production raise some privacy and security concerns. This presentation aims to open the assumed revolutionary, democratic and liberating nature of the online social media up for discussion by reviewing some recent political developments in Turkey. Firstly, the role of Internet and online social networks in mobilizing collective movements through social interactions and communications will be questioned. Secondly, some cases from Gezi and Okmeydanı Protests and also December 17-25 period will be presented in order to illustrate misinformation and manipulation in social media and violation of individual privacy through online social networks in order to damage social unity and stability contradictory to democratic nature of online social networking.

Keywords: online social media networks, democratic participation, social movements, social polarization, privacy of individuals, Turkey

Procedia PDF Downloads 317
463 The Information-Seeking Behaviour of Kuwaiti Judges (KJs)

Authors: Essam Mansour

Abstract:

The key purpose of this study is to show information-seeking behaviour of Kuwaiti Judges (KJs). Being one of the few studies about the information needs and information-seeking behaviour conducted in Arab and developing countries, this study is a pioneer one among many studies conducted in information seeking, especially with this significant group of information users. The authors tried to investigate this seeking behavior in terms of KJs' thoughts, perceptions, motivations, techniques, preferences, tools and barriers met when seeking information. The authors employed a questionnaire, with a response rate 77.2 percent. This study showed that most of KJs were likely to be older, educated and with a work experience ranged from new to old experience. There is a statistically reliable significant difference between KJs' demographic characteristics and some sources of information, such as books, encyclopedias, references and mass media. KJs were using information moderately to make a decision, to be in line with current events, to collect statistics and to make a specific/general research. The office and home were the most frequent location KJs were accessing information from. KJs' efficiency level of the English language is described to be moderately good, and a little number of them confirmed that their efficiency level of French was not bad. The assistance provided by colleagues, followed by consultants, translators, sectaries and librarians were found to be most strong types of assistance needed when seeking information. Mobile apps, followed by PCs, information networks (the Internet) and information databases were the highest technology tool used by KJs. Printed materials, followed by non-printed and audiovisual materials were the most preferred information formats KJs use. The use of languages, the recency of information and the place of information, the deficit role of the library to deliver information were at least significant barriers to KJs when seeking information.

Keywords: information users, information-seeking behaviour, information needs, judges, Kuwait

Procedia PDF Downloads 281
462 Commerce and Islamic Banking System

Authors: Rahmoune Abdelhaq

Abstract:

Systemic Islamic banking has been in practice for long but started receiving due attention and high popularity since last decade. It has received a warm welcome from all over the world and these banks operating on Islamic principles have been able to get a sizeable business not only in Islamic countries but in non-Islamic countries too. Despite exemplary advancements and achievements, there remains number of controversies over various underlying concepts and practices. This paper basically explores and highlights all those controversies and challenges which are in minds of different school of thoughts and are needed to be addressed and overcome if Islamic banking continues flourishing the way it is at present. The authors have also tried to suggest suitable remedies to overcome these challenges where appropriate. As well, This paper makes an attempt to review major principles surrounding the working of Islamic banking and its historical growth. A brief overview of main differences between the Islamic banking and the conventional banking. In addition, references are particularly made to implications arising from the emergence of e-commerce and the realities that the Islamic Shari’ah law has to consider in adopting the new phenomenon into its banking system. This paper shows, whilst the conventional banking and financial system is based on the principle of rationality and interest, the Islamic financial system is based on morality and social justice which prohibits interest as a means of speculation and injustice. The concepts of e-business such as e-commerce and e-banking are acceptable in Islam as since in Islam anything is halal unless prohibited by Shari’ah, dealing with business by internet is considered as Shari’ah compliant. This paper, therefore, provides the latest thinking of e-business from an Islamic viewpoint, thus creating a reference point and valued information for a future research.

Keywords: Islamic Finance, principles of Islamic banking, Islamic commerce, Shari’ah compliant

Procedia PDF Downloads 387
461 Niche Authorities and Social Activism: Interrogating the Activities of Selected Bloggers in Ghana

Authors: Akosua Asantewaa Anane

Abstract:

Social media and its networking sites have become beneficial to society. With the advent of Web 2.0, many people are becoming technologically savvy and attracted to internet-based activities. With the click of a button, users are now sharing more information on topics, events and issues than before. A new phenomenon in the Ghanaian journalism sphere is the advent of blogger and citizen journalism, some of whom have become niche authorities. Niche authorities have emerged through the habitual and persistent curation of news on specific topics, resulting in the steady growth and emergence of valuable contributions to news sharing. Minimal studies have been conducted on niche authorities and their role in social activism in Ghana. This study, anchored on Cialdini’s Six Principles of Persuasion (reciprocation, consistency, social proof, liking, authority and scarcity), explores the features of niche authorities, their areas of expertise, as well as their authoritative voices in the curation of news stories. Using qualitative content analysis, cyber ethnography and thematic analysis of purposively sampled social media posts of five niche authorities, the study interrogates how these niche authorities employ the six principles of persuasion on their platforms to spark conversations on development, social inclusion and gender-based issues in the country. The study discusses how niche authorities deploy the principles in social activism and further recommends nurturing and mentoring communication strategies to progressively guide the youth to become future niche authorities in news curation and news sharing.

Keywords: social activism, cialdini’s six principles of persuasion, news curation, niche authorities

Procedia PDF Downloads 35
460 Smartphones as a Tool of Mobile Journalism in Saudi Arabia

Authors: Ahmed Deen

Abstract:

The introduction of the mobile devices which were equipped with internet access and a camera, as well as the messaging services, has become a major inspiration for the use of the mobile devices in the growth in the reporting of news. Mobile journalism (MOJO) was a creation of modern technology, especially the use of mobile technology for video journalism purposes. MOJO, thus, is the process by which information is collected and disseminated to society, through the use of mobile technology, and even the use of the tablets. This paper seeks to better understand the ethics of Saudi mobile journalists towards news coverage. Also, this study aims to explore the relationship between minimizing harms and truth-seeking efforts among Saudi mobile journalists. Three main ethics were targeted in this study, which are seek truth and report it, minimize harm, and being accountable. Diffusion of innovation theory applied to reach this study’s goals. The non- probability sampling approach, ‘Snowball Sampling’ was used to target 124 survey participants, an online survey via SurveyMonkey that was distributed through social media platforms as a web link. The code of ethics of the Society of Professional Journalists has applied as a scale in this study. This study found that the relationship between minimizing harm and truth-seeking efforts is significantly moderate among Saudi mobile journalists. Also, it is found that the level journalistic experiences and using smartphones to cover news are weakly and negatively related to the perceptions of mobile journalism among Saudi journalists, while Saudi journalists who use their smartphone to cover the news between 1-3 years, were the majority of participants (55 participants by 51.4%).

Keywords: mobile journalism, Saudi journalism, smartphone, Saudi Arabia

Procedia PDF Downloads 141
459 Teachers’ Experiences regarding Use of Information and Communication Technology for Visually Impaired Students

Authors: Zikra Faiz, Zaheer Asghar, Nisar Abid

Abstract:

Information and Communication Technologies (ICTs) includes computers, the Internet, and electronic delivery systems such as televisions, radios, multimedia, and overhead projectors etc. In the modern world, ICTs is considered as an essential element of the teaching-learning process. The study was aimed to discover the usage of ICTs in Special Education Institutions for Visually Impaired students, Lahore, Pakistan. Objectives of the study were to explore the problems faced by teachers while using ICT in the classroom. The study was phenomenology in nature; a qualitative survey method was used through a semi-structured interview protocol developed by the researchers. The sample comprised of eighty faculty members selected through a purposive sampling technique. Data were analyzed through thematic analysis technique with the help of open coding. The study findings revealed that multimedia, projectors, computers, laptops and LEDs are used in special education institutes to enhance the teaching-learning process. Teachers believed that ICTs could enhance the knowledge of visually impaired students and every student should use these technologies in the classroom. It was concluded that multimedia, projectors and laptops are used in classroom by teachers and students. ICTs can promote effectively through the training of teachers and students. It was suggested that the government should take steps to enhance ICTs in teacher training and other institutions by pre-service and in-service training of teachers.

Keywords: information and communication technologies, in-services teachers, special education institutions

Procedia PDF Downloads 101
458 The Implementation of Entrepreneurial Marketing in Small Business Enterprise

Authors: Iin Mayasari

Abstract:

This study aims at exploring the influence of aspects of entrepreneurial marketing on a firm’s performance. Entrepreneurs are not only supported by resources control to obtain sustainable competitive advantage, but it should also be supported by intangible resources. Entrepreneurial marketing provides the opportunity for entrepreneurs to proactively find better ways to create value for desired customers, to create innovation, and to build customer equity. Entrepreneurial marketing has the medium between entrepreneurship and marketing, and serves as an umbrella for many of the emergent perspectives on marketing. It has eight underlying dimensions. They are proactiveness, calculated risk-taking, innovativeness, an opportunity focus, entrepreneurial orientation, resource leveraging, customer intensity, and value creating. The research method of the study was a qualitative study by having an interview with 8 small companies in Kudus Region, the Central Java, Indonesia. The interviewees were the owner and the manager of the company that had the scope work of small business enterprise in wood crafting industry. The interview was related to the implementation of the elements of the entrepreneurial marketing. The result showed that the small business enterprises had implemented the elements of entrepreneurial marketing in supporting their daily activities. The understanding based on the theoretical implementation was well executed by the owner and managers. The problems in managing small business enterprises were related to the full support by the government and the branding management. Furthermore, the innovation process should be improved especially the use of internet to promote the product, to expand the market and to increase the firm’s performance.

Keywords: entrepreneurial marketing, innovativeness, risk taking, opportunity focus

Procedia PDF Downloads 270
457 Representation of Islamophobia on Social Media: Facebook Comments Analysis

Authors: Nadia Syed

Abstract:

The digital age has inevitably changed the way in which hate crime is committed. The cyber world has become a highly effective means for individuals and groups to be targeted, harmed, and marginalized , largely through online medium. Facebook has become one of the fastest growing social media platforms. At the end of 2013, Facebook had 1,23bn monthly active users and 757 million daily users who log onto Facebook. Within this online space, there are also an increasing number of online virtual communities, and hate groups who are using this freedom to share a violent, Islamophobic and racist description which attempts to create a aggressive virtual environment. This paper is a research on the rise of Islamophobia and the role of media in spreading it. This paper focusing on how the media especially Facebook is portraying Islam as the religion which promotes violence and ultimately playing a significant role in the global rise of Islamophobia against Muslims. It is important to analyse these ‘new’ communities by monitoring the activities they conduct, because the material they post, potentially can have a harmful impact on community cohesion within society. Additionally, as a result of recent figures that shows an increase in online anti-Muslim abuse, there is a pertinent need to address the issue about Islamophobia on social media. On the whole, this study found Muslims being demonized and vilified online which had manifested through negative attitudes, discrimination, stereotypes, physical threats and online harassment which all had the potential to incite violence or prejudicial action because it disparages and intimidates a protected individual or group.

Keywords: Islamophobia, online, social media, facebook, internet, extremism

Procedia PDF Downloads 72
456 Dental Pathologies and Diet in Pre-hispanic Populations of the Equatorial Pacific Coast: Literature Review

Authors: Ricardo Andrés Márquez Ortiz

Abstract:

Objective. The objective of this literature review is to compile updated information from studies that have addressed the association between dental pathologies and diet in prehistoric populations of the equatorial Pacific coast. Materials and method. The research carried out corresponds to a documentary study of ex post facto retrospective, historiographic and bibliometric design. A bibliographic review search was carried out in the libraries of the Colombian Institute of Anthropology and History (ICANH) and the National University of Colombia for books and articles on the archeology of the region. In addition, a search was carried out in databases and the Internet for books and articles on dental anthropology, archeology and dentistry on the relationship between dental pathologies and diet in prehistoric and current populations from different parts of the world. Conclusions. The complex societies (500 BC - 300 AD) of the equatorial Pacific coast used an agricultural system of intensive monoculture of corn (Zea mays). This form of subsistence was reflected in an intensification of dental pathologies such as dental caries, dental abscesses generated by cavities, and enamel hypoplasia associated with a lower frequency of wear. The Upper Formative period (800 A.D. -16th century A.D.) is characterized by the development of polyculture, slash-and-burn agriculture, as an adaptive agricultural strategy to the ecological damage generated by the intensive economic activity of complex societies. This process leads to a more varied diet, which generates better dental health.

Keywords: dental pathologies, nutritional diet, equatorial pacific coast, dental anthropology

Procedia PDF Downloads 19
455 The Attitudes towards English Relative to Other Languages in Indonesia: Discrepancies between Policy and Usage

Authors: Rani Silvia

Abstract:

English has surpassed other languages to become the most widely taught and studied foreign language in Indonesia. This reflects the tendency of the Indonesian public to participate in global mainstream culture, which is longstanding but has been greatly facilitated by the widespread availability of television, the traditional media, and more recently the Internet and social media. However, despite increasing exposure and a history of teaching and study, mastery of English remains low, even as interest and perceived importance continue to increase. This along with Indonesia’s extremely complex linguistic environment has increased the status and value associated with the use of English and is changing the dynamic of language use nationwide. This study investigates the use of English in public settings in Indonesia as well as the attitudes of Indonesian speakers towards English. A case study was developed to explicate this phenomenon in a major Indonesian city. Fifty individuals, including both professionals and lay people, were interviewed about their language preferences as well as their perceptions about English as compared to other languages, such as the local language, Indonesian as the national language, and other foreign languages. Observations on the use of language in the public environment in advertising, signs, and other forms of public expression were analyzed to identify language preferences at this level and their relationship to current language policy. This study has three major findings. First, Indonesian speakers have more positive attitudes towards English than other languages; second, English has encroached on domains in which Indonesian should be used; and third, perceived awareness of the importance of Indonesian as an introduced national language seems to be declining to suggest a failure of policy. The study includes several recommendations for the future development of language planning in determining and directing language use in a public context in Indonesia.

Keywords: English, Indonesia, language attitudes, language policy

Procedia PDF Downloads 87
454 A Retrospective Study of the Effects of Xenophobia on South Africa-Nigeria Relations

Authors: O. Fayomi, F. Chidozie, C. Ayo

Abstract:

The underlying causes of xenophobia are complex and varied. Xenophobia has to do with being contemptuous of that which is foreign, especially of strangers or of people from different countries or cultures. Unemployment and mounting poverty among South Africans at the bottom of the economic ladder have provoked fears of the competition that better educated and experienced migrants can represent. South Africa’s long track-record of violence as a means of protest and the targeting of foreigners in particular, and, the documented tensions over migration policy and the scale of repatriation serve a very good explanation for its xenophobia. It was clear that while most of the attacks were directed against foreign, primarily African, migrants, this was not the rule. Attacks were also noted against Chinese-speakers, Pakistani migrants as well as against South Africans from minority language groups (in the conflict areas). Settlements that have recently experienced the expression of ‘xenophobic’ violence have also been the site of violent and other forms of protest around other issues, most notably service delivery. The failure of government in service delivery was vexed on this form of xenophobia. Due to the increase in migration, this conflict is certainly not temporary in nature. Xenophobia manifests in different regions and communities with devastating effects on the affected nationals. Nigerians living in South Africa have been objects of severe attacks and assault as a result of this xenophobic attitude. It is against this background that this study seeks to investigate the xenophobic attacks against Nigerians in South Africa. The methodology is basically qualitative with the use of secondary sources such as books, journals, newspapers and internet sources.

Keywords: xenophobia, unemployment, poverty, Nigeria, South Africa

Procedia PDF Downloads 450
453 The Strategic Entering Time of a Commerce Platform

Authors: Chia-li Wang

Abstract:

The surge of service and commerce platforms, such as e-commerce and internet-of-things, have rapidly changed our lives. How to avoid the congestion and get the job done in the platform is now a common problem that many people encounter every day. This requires platform users to make decisions about when to enter the platform. To that end, we investigate the strategic entering time of a simple platform containing random numbers of buyers and sellers of some item. Upon a trade, the buyer and the seller gain respective profits, yet they pay the cost of waiting in the platform. To maximize their expected payoffs from trading, both buyers and sellers can choose their entering times. This creates an interesting and practical framework of a game that is played among buyers, among sellers, and between them. That is, a strategy employed by a player is not only against players of its type but also a response to those of the other type, and, thus, a strategy profile is composed of strategies of buyers and sellers. The players' best response, the Nash equilibrium (NE) strategy profile, is derived by a pair of differential equations, which, in turn, are used to establish its existence and uniqueness. More importantly, its structure sheds valuable insights of how the entering strategy of one side (buyers or sellers) is affected by the entering behavior of the other side. These results provide a base for the study of dynamic pricing for stochastic demand-supply imbalances. Finally, comparisons between the social welfares (the sum of the payoffs incurred by individual participants) obtained by the optimal strategy and by the NE strategy are conducted for showing the efficiency loss relative to the socially optimal solution. That should help to manage the platform better.

Keywords: double-sided queue, non-cooperative game, nash equilibrium, price of anarchy

Procedia PDF Downloads 65
452 To Cloudify or Not to Cloudify

Authors: Laila Yasir Al-Harthy, Ali H. Al-Badi

Abstract:

As an emerging business model, cloud computing has been initiated to satisfy the need of organizations and to push Information Technology as a utility. The shift to the cloud has changed the way Information Technology departments are managed traditionally and has raised many concerns for both, public and private sectors. The purpose of this study is to investigate the possibility of cloud computing services replacing services provided traditionally by IT departments. Therefore, it aims to 1) explore whether organizations in Oman are ready to move to the cloud; 2) identify the deciding factors leading to the adoption or rejection of cloud computing services in Oman; and 3) provide two case studies, one for a successful Cloud provider and another for a successful adopter. This paper is based on multiple research methods including conducting a set of interviews with cloud service providers and current cloud users in Oman; and collecting data using questionnaires from experts in the field and potential users of cloud services. Despite the limitation of bandwidth capacity and Internet coverage offered in Oman that create a challenge in adopting the cloud, it was found that many information technology professionals are encouraged to move to the cloud while few are resistant to change. The recent launch of a new Omani cloud service provider and the entrance of other international cloud service providers in the Omani market make this research extremely valuable as it aims to provide real-life experience as well as two case studies on the successful provision of cloud services and the successful adoption of these services.

Keywords: cloud computing, cloud deployment models, cloud service models, deciding factors

Procedia PDF Downloads 263
451 Challenges for Adopting Circular Economy Toward Business Innovation and Supply Chain

Authors: Kapil Khanna, Swee Kuik, Joowon Ban

Abstract:

The current linear economic system is unsustainable due to its dependence on the uncontrolled exploitation of diminishing natural resources. The integration of business innovation and supply chain management has brought about the redesign of business processes through the implementation of a closed-loop approach. The circular economy (CE) offers a sustainable solution to improve business opportunities in the near future by following the principles of rejuvenation and reuse inspired by nature. Those business owners start to rethink and consider using waste as raw material to make new products for consumers. The implementation of CE helps organisations to incorporate new strategic plans for decreasing the use of virgin materials and nature resources. Supply chain partners that are geographically dispersed rely heavily on innovative approaches to support supply chain management. Presently, numerous studies have attempted to establish the concept of supply chain management (SCM) by integrating CE principles, which are commonly denoted as circular SCM. While many scholars have recognised the challenges of transitioning to CE, there is still a lack of consensus on business best practices that can facilitate companies in embracing CE across the supply chain. Hence, this paper strives to scrutinize the SCM practices utilised for CE, identify the obstacles, and recommend best practices that can enhance a company's ability to incorporate CE principles toward business innovation and supply chain performance. Further, the paper proposes future research in the field of using specific technologies such as artificial intelligence, Internet of Things, and blockchain as business innovation tools for supply chain management and CE adoption.

Keywords: business innovation, challenges, circular supply chain, supply chain management, technology

Procedia PDF Downloads 68
450 Security Design of Root of Trust Based on RISC-V

Authors: Kang Huang, Wanting Zhou, Shiwei Yuan, Lei Li

Abstract:

Since information technology develops rapidly, the security issue has become an increasingly critical for computer system. In particular, as cloud computing and the Internet of Things (IoT) continue to gain widespread adoption, computer systems need to new security threats and attacks. The Root of Trust (RoT) is the foundation for providing basic trusted computing, which is used to verify the security and trustworthiness of other components. Design a reliable Root of Trust and guarantee its own security are essential for improving the overall security and credibility of computer systems. In this paper, we discuss the implementation of self-security technology based on the RISC-V Root of Trust at the hardware level. To effectively safeguard the security of the Root of Trust, researches on security safeguard technology on the Root of Trust have been studied. At first, a lightweight and secure boot framework is proposed as a secure mechanism. Secondly, two kinds of memory protection mechanism are built to against memory attacks. Moreover, hardware implementation of proposed method has been also investigated. A series of experiments and tests have been carried on to verify to effectiveness of the proposed method. The experimental results demonstrated that the proposed approach is effective in verifying the integrity of the Root of Trust’s own boot rom, user instructions, and data, ensuring authenticity and enabling the secure boot of the Root of Trust’s own system. Additionally, our approach provides memory protection against certain types of memory attacks, such as cache leaks and tampering, and ensures the security of root-of-trust sensitive information, including keys.

Keywords: root of trust, secure boot, memory protection, hardware security

Procedia PDF Downloads 150
449 Security Analysis of Mod. S Transponder Technology and Attack Examples

Authors: M. Rutkowski, J. Cwiklak, M. Grzegorzewski, M. Adamski

Abstract:

All class A Airplanes have to be equipped with Mod. S transponder for ATC surveillance purposes. This technology was designed to provide a robust and dependable solution to localize, identify and exchange data with the airplane. The purpose of this paper is to analyze potential hazards that are a result of lack of any security or encryption on a design level. Secondary Surveillance Radars rely on an active response from an airplane. SSR radar installation is broadcasting a directional interrogation signal to the planes in range on 1030MHz frequency with DPSK modulation. If the interrogation is correctly received by the transponder located on the plane, a proper answer is sent on 1090MHz with PPM modulation containing plane’s SQUAWK, barometric altitude, GPS coordinates and 24bit unique address code. This technology does not use any kind of encryption. All of the specifications from the previous chapter can be found easily on the internet. Since there is no encryption or security measure to ensure the credibility of the sender and message, it is highly hazardous to use such technology to ensure the safety of the air traffic. The only thing that identifies the airplane is the 24-bit unique address. Most of the planes have been sniffed by aviation enthusiasts and cataloged in web databases. In the moment of writing this article, The PoFung Technologies has announced that they are planning to release all band SDR transceiver – this device would be more than enough to build your own Mod. S Transponder. With fake transponder, a potential terrorist can identify as a different airplane. By replacing the transponder in a poorly controlled airspace, hijackers can enter another airspace identifying themselves as another plane and land in the desired area.

Keywords: flight safety, hijack, mod S transponder, security analysis

Procedia PDF Downloads 274
448 Big Data in Telecom Industry: Effective Predictive Techniques on Call Detail Records

Authors: Sara ElElimy, Samir Moustafa

Abstract:

Mobile network operators start to face many challenges in the digital era, especially with high demands from customers. Since mobile network operators are considered a source of big data, traditional techniques are not effective with new era of big data, Internet of things (IoT) and 5G; as a result, handling effectively different big datasets becomes a vital task for operators with the continuous growth of data and moving from long term evolution (LTE) to 5G. So, there is an urgent need for effective Big data analytics to predict future demands, traffic, and network performance to full fill the requirements of the fifth generation of mobile network technology. In this paper, we introduce data science techniques using machine learning and deep learning algorithms: the autoregressive integrated moving average (ARIMA), Bayesian-based curve fitting, and recurrent neural network (RNN) are employed for a data-driven application to mobile network operators. The main framework included in models are identification parameters of each model, estimation, prediction, and final data-driven application of this prediction from business and network performance applications. These models are applied to Telecom Italia Big Data challenge call detail records (CDRs) datasets. The performance of these models is found out using a specific well-known evaluation criteria shows that ARIMA (machine learning-based model) is more accurate as a predictive model in such a dataset than the RNN (deep learning model).

Keywords: big data analytics, machine learning, CDRs, 5G

Procedia PDF Downloads 113
447 Effects of E-Learning Mode of Instruction and Conventional Mode of Instruction on Student’s Achievement in English Language in Senior Secondary Schools, Ibadan Municipal, Nigeria

Authors: Ibode Osa Felix

Abstract:

The use of e-Learning is presently intensified in the academic world following the outbreak of the Covid-19 pandemic in early 2020. Hitherto, e-learning had made its debut in teaching and learning many years ago when it emerged as an aspect of Computer Based Teaching, but never before has its patronage become so important and popular as currently obtains. Previous studies revealed that there is an ongoing debate among researchers on the efficacy of the E-learning mode of instruction over the traditional teaching method. Therefore, the study examined the effect of E-learning and Conventional Mode of Instruction on Students Achievement in the English Language. The study is a quasi-experimental study in which 230 students, from three public secondary schools, were selected through a simple random sampling technique. Three instruments were developed, namely, E-learning Instructional Guide (ELIG), Conventional Method of Instructional Guide (CMIG), and English Language Achievement Test (ELAT). The result revealed that students taught through the conventional method had better results than students taught online. The result also shows that girls taught with the conventional method of teaching performed better than boys in the English Language. The study, therefore, recommended that effort should be made by the educational authorities in Nigeria to provide internet facilities to enhance practices among learners and provide electricity to power e-learning equipment in the secondary schools. This will boost e-learning practices among teachers and students and consequently overtake conventional method of teaching in due course.

Keywords: e-learning, conventional method of teaching, achievement in english, electricity

Procedia PDF Downloads 141
446 Perceived Risks in Business-to-Consumer Online Contracts: An Empirical Study in Saudi Arabia

Authors: Shaya Alshahrani

Abstract:

Perceived risks play a major role in consumer intentions, behaviors, attitudes, and decisions about online shopping in the KSA. This paper investigates the influence of six perceived risk dimensions on Saudi consumers: product risk, information risk, financial risk, privacy and security risk, delivery risk, and terms and conditions risk empirically. To ensure the success of this study, a random survey was distributed to reflect the consumers’ perceived risk and to enable the generalization of the results. Data were collected from 323 respondents in the Kingdom of Saudi Arabia (KSA): 50 who had never shopped online and 273 who had done so. The results indicated that all six risks influenced the respondents’ perceptions of online shopping. The non-online shoppers perceived financial and delivery risks as the most significant barriers to online shopping. This was followed closely by performance, information, and privacy and security risks. Terms and conditions were perceived as less significant. The online consumers considered delivery and performance risks to be the most significant influences on internet shopping. This was followed closely by information and terms and conditions. Financial and privacy and security risks were perceived as less significant. This paper argues that introducing adequate legal solutions to addressing related problems arising from this study is an urgent need. This may enhance consumer trust in the KSA online market, increase consumers’ intentions regarding online shopping, and improve consumer protection.

Keywords: perceived risk, online contracts, Saudi Arabia, consumer protection

Procedia PDF Downloads 121
445 The Experience of Gay Men Using Dating Applications in Their Emerging Adulthood

Authors: Chuang Bing-Kai, Shih Hsiang-Ju

Abstract:

Previous studies showed that emergent adults used dating applications the most since it would satisfy their needs for intimacy. It's also found that those emergent adults were mostly non-heterosexual. What’s more, in this digital era, more and more bisexuals and homosexuals choose to establish connections with others through Internet to seek a sense of belonging. However, studies rarely focused on gay men in their emergent adulthood to explore their experiences of dating applications. The purpose of this study was to explore the experience of gay men using dating applications in their emerging adulthood and to understand their self-presentations and the process of it among different relationships while interacting with others upon using dating applications. The semi-structured interview was conducted with those gay men who aged from 18 to 29, felt attracted to people with same gender physically and mentally, considered themselves homosexual from their subjective understanding and had been using dating applications for more than half a year. Research invitations were distributed with the assistance of social media platforms and LGBTQ+ friends in the community. This study adopted a qualitative research approach and applied hermeneutic phenomenology as the method to analyze the transcripts transcribed from the recorded audio, and to explore their using experiences and self-presentations while interacting with others while using dating apps. It’s expected to find out that there are four stages in the self-presentation process including establishing personal identity, self-exploration and experimentation, exploring shared interest and values, developing and maintaining connections. Plus, gay men’s motives to use dating apps play an important role in this process and thus influence how they position the apps in their life. Through this study, professional workers can better understand gay men’s considerations and strategies in their self-presentation process as well as the impact of using motives.

Keywords: dating applications, emerging adulthood, gay men, hermeneutic phenomenology

Procedia PDF Downloads 20
444 Associated Map and Inter-Purchase Time Model for Multiple-Category Products

Authors: Ching-I Chen

Abstract:

The continued rise of e-commerce is the main driver of the rapid growth of global online purchase. Consumers can nearly buy everything they want at one occasion through online shopping. The purchase behavior models which focus on single product category are insufficient to describe online shopping behavior. Therefore, analysis of multi-category purchase gets more and more popular. For example, market basket analysis explores customers’ buying tendency of the association between product categories. The information derived from market basket analysis facilitates to make cross-selling strategies and product recommendation system. To detect the association between different product categories, we use the market basket analysis with the multidimensional scaling technique to build an associated map which describes how likely multiple product categories are bought at the same time. Besides, we also build an inter-purchase time model for associated products to describe how likely a product will be bought after its associated product is bought. We classify inter-purchase time behaviors of multi-category products into nine types, and use a mixture regression model to integrate those behaviors under our assumptions of purchase sequences. Our sample data is from comScore which provides a panelist-label database that captures detailed browsing and buying behavior of internet users across the United States. Finding the inter-purchase time from books to movie is shorter than the inter-purchase time from movies to books. According to the model analysis and empirical results, this research finally proposes the applications and recommendations in the management.

Keywords: multiple-category purchase behavior, inter-purchase time, market basket analysis, e-commerce

Procedia PDF Downloads 347