Search results for: Internet purchases
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1654

Search results for: Internet purchases

1444 DOS and DDOS Attacks

Authors: Amin Hamrahi, Niloofar Moghaddam

Abstract:

Denial of Service is for denial-of-service attack, a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic. Denial of Service (DoS) attacks have become a major threat to current computer networks. Many recent DoS attacks were launched via a large number of distributed attacking hosts in the Internet. These attacks are called distributed denial of service (DDoS) attacks. To have a better understanding on DoS attacks, this article provides an overview on existing DoS and DDoS attacks and major defense technologies in the Internet.

Keywords: denial of service, distributed denial of service, traffic, flooding

Procedia PDF Downloads 352
1443 An Analysis of Twitter Use of Slow Food Movement in the Context of Online Activism

Authors: Kubra Sultan Yuzuncuyil, Aytekin İsman, Berkay Bulus

Abstract:

With the developments of information and communication technologies, the forms of molding public opinion have changed. In the presence of Internet, the notion of activism has been endowed with digital codes. Activists have engaged the use of Internet into their campaigns and the process of creating collective identity. Activist movements have been incorporating the relevance of new communication technologies for their goals and opposition. Creating and managing activism through Internet is called Online Activism. In this main, Slow Food Movement which was emerged within the philosophy of defending regional, fair and sustainable food has been engaging Internet into their activist campaign. This movement supports the idea that a new food system which allows strong connections between plate and planet is possible. In order to make their voices heard, it has utilized social networks and develop particular skills in the framework online activism. This study analyzes online activist skills of Slow Food Movement (SFM) develop and attempts to measure its effectiveness. To achieve this aim, it adopts the model proposed by Sivitandies and Shah and conduct both qualitiative and quantiative content analysis on social network use of Slow Food Movement. In this regard, the sample is chosen as the official profile and analyzed between in a three month period respectively March-May 2017. It was found that SFM develops particular techniques that appeal to the model of Sivitandies and Shah. The prominent skill in this regard was found as hyperlink abbreviation and use of multimedia elements. On the other hand, there are inadequacies in hashtag and interactivity use. The importance of this study is that it highlights and discusses how online activism can be engaged into a social movement. It also reveals current online activism skills of SFM and their effectiveness. Furthermore, it makes suggestions to enhance the related abilities and strengthen its voice on social networks.

Keywords: slow food movement, Twitter, internet, online activism

Procedia PDF Downloads 239
1442 Network Traffic Classification Scheme for Internet Network Based on Application Categorization for Ipv6

Authors: Yaser Miaji, Mohammed Aloryani

Abstract:

The rise of recent applications in everyday implementation like videoconferencing, online recreation and voice speech communication leads to pressing the need for novel mechanism and policy to serve this steep improvement within the application itself and users‟ wants. This diversity in web traffics needs some classification and prioritization of the traffics since some traffics merit abundant attention with less delay and loss, than others. This research is intended to reinforce the mechanism by analysing the performance in application according to the proposed mechanism implemented. The mechanism used is quite direct and analytical. The mechanism is implemented by modifying the queue limit in the algorithm.

Keywords: traffic classification, IPv6, internet, application categorization

Procedia PDF Downloads 524
1441 Comparison of Power Consumption of WiFi Inbuilt Internet of Things Device with Bluetooth Low Energy

Authors: Darshana Thomas, Edward Wilkie, James Irvine

Abstract:

The Internet of things (IoT) is currently a highly researched topic, especially within the context of the smart home. These are small sensors that are capable of gathering data and transmitting it to a server. The majority of smart home products use protocols such as ZigBee or Bluetooth Low Energy (BLE). As these small sensors are increasing in number, the need to implement these with much more capable and ubiquitous transmission technology is necessary. The high power consumption is the reason that holds these small sensors back from using other protocols such as the most ubiquitous form of communication, WiFi. Comparing the power consumption of existing transmission technologies to one with WiFi inbuilt, would provide a better understanding for choosing between these technologies. We have developed a small IoT device with WiFi capability and proven that it is much more efficient than the first protocol, 433 MHz. We extend our work in this paper and compare WiFi power consumption with the other most widely used protocol BLE. The experimental results in this paper would conclude whether the developed prototype is capable in terms of power consumption to replace the existing protocol BLE with WiFi.

Keywords: bluetooth, internet of things (IoT), power consumption, WiFi

Procedia PDF Downloads 232
1440 Evaluating Global ‘Thing’ Security of Consumer Products

Authors: Achutha Raman

Abstract:

Today's brave new world features a bonanza of digitally interconnected products, or ‘things,’ that improve convenience, possibilities, and in some cases efficiency for consumers. Nonetheless, even as the market accelerates, this Internet of ‘things’ is subject to substantial leakage of consumer personal data. First defining the fluid concept of ‘things,’ this paper subsequently uses case studies taken from the EU, Asia, and the US, to highlight large gaps and comprehensively evaluate the state of security for consumer ‘things.’ Ultimately, this paper offers several ways of improving the present status quo, and especially focuses on an evaluative approach that augments the standard mechanism of Firmware Over the Air Updates, and ought to be easily implementable.

Keywords: cybersecurity, FOTA, Internet of Things, transnational privacy

Procedia PDF Downloads 177
1439 Integrating ICT in Teaching and Learning English in the Algerian Classroom

Authors: A. Tahar Djebbar

Abstract:

Modern technologies have penetrated all spheres of human life, education being one of them. This paper focuses the attention on the integration of technology-based education in the Algerian classroom in teaching foreign languages. It sheds light on a specific area of ICT application: ICT in English learning and teaching. Some Algerian teachers or tutors of English face many challenges among which the lack of teaching materials which are indispensable for transmitting knowledge to learners. Thus, they find themselves compelled to use online e-books or download them in PDF form to support their lessons. Teachers even download such teaching materials like pictures, videos, audios, podcasts, and flash cards from the internet and store them in their Flash USBs to shape up the teaching-learning conditions. They use computers, data shows, and the internet so as to facilitate the teaching–learning process in the classroom. Hence, technology has become a must in the Algerian classroom especially in teaching English which has become a very important language in a national and an international level. This study aims at showing that Algerian tutors/teachers who take up the challenge of getting involved in the technology-enhanced language learning and teaching in the Algerian schools and universities face many obstacles.

Keywords: computer, communication, English, internet, learners, language acquisition, teaching, technology

Procedia PDF Downloads 590
1438 An Investigation into the Views of Gifted Children on the Effects of Computer and Information Technologies on Their Lives and Education

Authors: Ahmet Kurnaz, Eyup Yurt, Ümit Çiftci

Abstract:

In this study, too, an attempt was made to reveal the place and effects of information technologies on the lives and education of gifted children based on the views of gifted. To this end, the effects of information technologies on gifted are general skills, technology use, academic and social skills, and cooperative and personal skills were investigated. These skills were explored depending on whether or not gifted had their own computers, had internet connection at home, or how often they use the internet, average time period they spent at the computer, how often they played computer games and their use of social media. The study was conducted using the screening model with a quantitative approach. The sample of the study consisted of 129 gifted attending 5-12th classes in 12 provinces in different regions of Turkey. 64 of the participants were female while 65 were male. The research data were collected using the using computer of gifted and information technologies (UCIT) questionnaire which was developed by the researchers and given its final form after receiving expert view. As a result of the study, it was found that UCIT use improved foreign language speaking skills of gifted, enabled them to get to know and understand different cultures, and made use of computer and information technologies while they study. At the end of the study these result were obtained: Gifted have positive idea using computer and communication technology. There are differences whether using the internet about the ideas UCIT. But there are not differences whether having computer, inhabited city, grade level, having internet at home, daily and weekly internet usage durations, playing the computer and internet game, having Facebook and Twitter account about the UCIT. UCIT contribute to the development of gifted vocabulary, allows knowing and understand different cultures, developing foreign language speaking skills, gifted do not give up computer when they do their homework, improve their reading, listening, understanding and writing skills in a foreign language. Gifted children want to have transition to the use of tablets in education. They think UCIT facilitates doing their homework, contributes learning more information in a shorter time. They'd like to use computer-assisted instruction programs at courses. They think they will be more successful in the future if their computer skills are good. But gifted students prefer teacher instead of teaching with computers and they said that learning can be run from home without going to school.

Keywords: gifted, using computer, communication technology, information technologies

Procedia PDF Downloads 353
1437 Importance of New Policies of Process Management for Internet of Things Based on Forensic Investigation

Authors: Venkata Venugopal Rao Gudlur

Abstract:

The Proposed Policies referred to as “SOP”, on the Internet of Things (IoT) based Forensic Investigation into Process Management is the latest revolution to save time and quick solution for investigators. The forensic investigation process has been developed over many years from time to time it has been given the required information with no policies in investigation processes. This research reveals that the current IoT based forensic investigation into Process Management based is more connected to devices which is the latest revolution and policies. All future development in real-time information on gathering monitoring is evolved with smart sensor-based technologies connected directly to IoT. This paper present conceptual framework on process management. The smart devices are leading the way in terms of automated forensic models and frameworks established by different scholars. These models and frameworks were mostly focused on offering a roadmap for performing forensic operations with no policies in place. These initiatives would bring a tremendous benefit to process management and IoT forensic investigators proposing policies. The forensic investigation process may enhance more security and reduced data losses and vulnerabilities.

Keywords: Internet of Things, Process Management, Forensic Investigation, M2M Framework

Procedia PDF Downloads 62
1436 Urban Spatial Experience Construction Strategies Under the Intervention of Online Media: A Case Study of Liziba Light Rail Station in Chongqing

Authors: Zhongde Wang, Fanwei Meng, Ling Yang

Abstract:

Today, social media deeply engages in urban spatial production in a ‘Disembedding’ form, allowing the public to ‘foresight’ physical spaces through online platforms and subsequently engage in corresponding ‘sight’ and visits, thus leading to the emergence of ‘Internet Celebrity Spots’. This paper delves into the laws of action of online media, focusing on experiences. From the perspectives of the public, space, and media, it thoroughly analyzes the experiential design strategies of Chongqing's Liziba Light Rail Station, including the construction of the experiential mainline capturing the matrix of public behavior, the creation of experiential sidelines leveraging spatial advantages, and the deepening of experiential touchpoints to promote media resonance. This analysis aims to provide insights and references for similar urban spaces to transition from ‘internet-famous’ to ‘real-famous’ attractions.

Keywords: online media, urban space, disembedding, internet celebrity spots, experience design

Procedia PDF Downloads 4
1435 E-Government, China Internet Plus, and the One Belt One Road Initiative: The Africa Connection

Authors: Isaac Kofi Mensah, Mi Jianing

Abstract:

The lack of Information and Communication Technologies (ICT) infrastructure in African countries is hampering the successful adoption, development and implementation of e-government in Africa. Electronic government is the use of ICTs to modernize government public administration processes and to provide government services to citizens with a purpose to enhance efficiency, accountability, and transparency in government’s interaction with the citizenry. ICT application in public administration has the potential to modernize and create smarter government and improvement in public service delivery. China’s Internet Plus policy and One Belt One Road strategy present a golden opportunity for countries in Africa to attract the huge financial investment through Chinese IT companies to develop and close Africa’s ICT infrastructure gap. This study recommends the establishment of One Belt One Road ICT Infrastructure Fund for Africa (OBOR ICT Fund for Africa) to enable countries in Africa to source solely for the purpose of ICT infrastructure development in the public sector/government machinery which would in turn promote the adoption and development of e-government in the public sectors of respective countries in Africa.

Keywords: e-government, public service delivery, internet plus, one belt one road initiative, China, Africa

Procedia PDF Downloads 628
1434 A Plan of Smart Management for Groundwater Resources

Authors: Jennifer Chen, Pei Y. Hsu, Yu W. Chen

Abstract:

Groundwater resources play a vital role in regional water supply because over 1/3 of total demand is satisfied by groundwater resources. Because over-pumpage might cause environmental impact such as land subsidence, a sustainable management of groundwater resource is required. In this study, a blueprint of smart management for groundwater resource is proposed and planned. The framework of the smart management can be divided into two major parts, hardware and software parts. First, an internet of groundwater (IoG) which is inspired by the internet of thing (IoT) is proposed to observe the migration of groundwater usage and the associated response, groundwater levels. Second, algorithms based on data mining and signal analysis are proposed to achieve the goal of providing highly efficient management of groundwater. The entire blueprint is a 4-year plan and this year is the first year. We have finished the installation of 50 flow meters and 17 observation wells. An underground hydrological model is proposed to determine the associated drawdown caused by the measured pumpages. Besides, an alternative to the flow meter is also proposed to decrease the installation cost of IoG. An accelerometer and 3G remote transmission are proposed to detect the on and off of groundwater pumpage.

Keywords: groundwater management, internet of groundwater, underground hydrological model, alternative of flow meter

Procedia PDF Downloads 335
1433 Customer Relations and Use of Online Shopping Sites

Authors: Bahar Urhan Torun, Havva Nur Tarakcı

Abstract:

At the present time, online marketing has become the common target of small and full-scale organizations. Today’s humanbeing who has to spend most of their time in front of the computer because of his job, prefers to socialize by internet due to the easy access to technology. So online marketing area expands day by day. All business organizations from the smallest to the biggest are in a race in order to get a cut from the virtual market share in an extreme competitive environment. However these organizations which use the internet to reach more consumers cannot determine their target group accurately, so this is the biggest handicap of online marketing sales nowadays. The aim of this study is to determine some significant elements about need for communicating efficiently with the consumer on the internet on online marketing. The strategies that can be used in order to increase sales and the limitations of virtual environment where cannot be communicated with the consumer face to face are argued in this study’s scope. As a consequence it is thought that to study on this subject because of lacking and also being limited efficiency of researches and outputs. Within this scope suggesting some proposals about how to communicate efficiently with the consumer and also offering the consumers’ demands efficiently is the essential objective of this study.

Keywords: online marketing, competition, consumer, communication

Procedia PDF Downloads 226
1432 A Low-Cost Air Quality Monitoring Internet of Things Platform

Authors: Christos Spandonidis, Stefanos Tsantilas, Elias Sedikos, Nektarios Galiatsatos, Fotios Giannopoulos, Panagiotis Papadopoulos, Nikolaos Demagos, Dimitrios Reppas, Christos Giordamlis

Abstract:

In the present paper, a low cost, compact and modular Internet of Things (IoT) platform for air quality monitoring in urban areas is presented. This platform comprises of dedicated low cost, low power hardware and the associated embedded software that enable measurement of particles (PM2.5 and PM10), NO, CO, CO2 and O3 concentration in the air, along with relative temperature and humidity. This integrated platform acts as part of a greater air pollution data collecting wireless network that is able to monitor the air quality in various regions and neighborhoods of an urban area, by providing sensor measurements at a high rate that reaches up to one sample per second. It is therefore suitable for Big Data analysis applications such as air quality forecasts, weather forecasts and traffic prediction. The first real world test for the developed platform took place in Thessaloniki, Greece, where 16 devices were installed in various buildings in the city. In the near future, many more of these devices are going to be installed in the greater Thessaloniki area, giving a detailed air quality map of the city.

Keywords: distributed sensor system, environmental monitoring, Internet of Things, smart cities

Procedia PDF Downloads 107
1431 The Integration of Patient Health Record Generated from Wearable and Internet of Things Devices into Health Information Exchanges

Authors: Dalvin D. Hill, Hector M. Castro Garcia

Abstract:

A growing number of individuals utilize wearable devices on a daily basis. The usage and functionality of these wearable devices vary from user to user. One popular usage of said devices is to track health-related activities that are typically stored on a device’s memory or uploaded to an account in the cloud; based on the current trend, the data accumulated from the wearable device are stored in a standalone location. In many of these cases, this health related datum is not a factor when considering the holistic view of a user’s health lifestyle or record. This health-related data generated from wearable and Internet of Things (IoT) devices can serve as empirical information to a medical provider, as the standalone data can add value to the holistic health record of a patient. This paper proposes a solution to incorporate the data gathered from these wearable and IoT devices, with that a patient’s Personal Health Record (PHR) stored within the confines of a Health Information Exchange (HIE).

Keywords: electronic health record, health information exchanges, internet of things, personal health records, wearable devices, wearables

Procedia PDF Downloads 86
1430 An Internet of Things-Based Weight Monitoring System for Honey

Authors: Zheng-Yan Ruan, Chien-Hao Wang, Hong-Jen Lin, Chien-Peng Huang, Ying-Hao Chen, En-Cheng Yang, Chwan-Lu Tseng, Joe-Air Jiang

Abstract:

Bees play a vital role in pollination. This paper focuses on the weighing process of honey. Honey is usually stored at the comb in a hive. Bee farmers brush bees away from the comb and then collect honey, and the collected honey is weighed afterward. However, such a process brings strong negative influences on bees and even leads to the death of bees. This paper therefore presents an Internet of Things-based weight monitoring system which uses weight sensors to measure the weight of honey and simplifies the whole weighing procedure. To verify the system, the weight measured by the system is compared to the weight of standard weights used for calibration by employing a linear regression model. The R2 of the regression model is 0.9788, which suggests that the weighing system is highly reliable and is able to be applied to obtain actual weight of honey. In the future, the weight data of honey can be used to find the relationship between honey production and different ecological parameters, such as bees’ foraging behavior and weather conditions. It is expected that the findings can serve as critical information for honey production improvement.

Keywords: internet of things, weight, honey, bee

Procedia PDF Downloads 413
1429 An Assessment of the Digital Transformation of Radio

Authors: Fatih Sogut

Abstract:

Developments in information technologies have caused significant changes in terms of radio and television broadcasting. With these changes in terms of production format, transmission techniques and service delivery, the distinction between traditional media and New Media has emerged. The viewer/listener, who was in a passive position before, is now in an active position and has a say in many matters, including content production. Visual and auditory data transfer has diversified and become easier thanks to the convergence phenomenon. These transformations and developments also affected one of the oldest electronic communication tools, radio. In this study, in order to adapt to the new era that emerged with the digital age, the change in radio broadcasting and the factors that led to this change were tried to be explained.

Keywords: Internet, radio broadcasting, digital transformation, Internet broadcasting

Procedia PDF Downloads 131
1428 Cyber Bullying Victimization of Elementary School Students and Their Reflections on the Victimization

Authors: Merve Sadetas Sezer, Ismail Sahin, Ahmet Oguz Akturk

Abstract:

With the use of developing technology, mostly in communication and entertainment, students spend considerable time on the internet. In addition to the advantages provided by the internet, social isolation brings problems such as addiction. This is one of the problems of the virtual violence. Cyber-bullying is the common name of the intensities which students are exposed on the internet. The purpose of this study designed as a qualitative research is to find out the cyber bullying varieties and its effects on elementary school students. The participants of this research are 6th, 7th and 8th grade students of a primary school and 24 students agreed to participate in the study. The students were asked to fill an interview with semi-structured open-ended questions. According to the results obtained in the research, the most important statements determined by the participants are breaking passwords on social networking sites, slang insult to blasphemy and taking friendship offers from unfamiliar people. According to participants from the research, the most used techniques to prevent themselves from cyber bullying are to complain to the site administrator, closing accounts on social networking sites and countercharging. Also, suggestions were presented according to the findings.

Keywords: bullying, cyber-bullying, elementary, peer-relationship, virtual victimization

Procedia PDF Downloads 308
1427 Alternative Key Exchange Algorithm Based on Elliptic Curve Digital Signature Algorithm Certificate and Usage in Applications

Authors: A. Andreasyan, C. Connors

Abstract:

The Elliptic Curve Digital Signature algorithm-based X509v3 certificates are becoming more popular due to their short public and private key sizes. Moreover, these certificates can be stored in Internet of Things (IoT) devices, with limited resources, using less memory and transmitted in network security protocols, such as Internet Key Exchange (IKE), Transport Layer Security (TLS) and Secure Shell (SSH) with less bandwidth. The proposed method gives another advantage, in that it increases the performance of the above-mentioned protocols in terms of key exchange by saving one scalar multiplication operation.

Keywords: cryptography, elliptic curve digital signature algorithm, key exchange, network security protocol

Procedia PDF Downloads 106
1426 Intelligent Rainwater Reuse System for Irrigation

Authors: Maria M. S. Pires, Andre F. X. Gloria, Pedro J. A. Sebastiao

Abstract:

The technological advances in the area of Internet of Things have been creating more and more solutions in the area of agriculture. These solutions are quite important for life, as they lead to the saving of the most precious resource, water, being this need to save water a concern worldwide. The paper proposes the creation of an Internet of Things system based on a network of sensors and interconnected actuators that automatically monitors the quality of the rainwater that is stored inside a tank in order to be used for irrigation. The main objective is to promote sustainability by reusing rainwater for irrigation systems instead of water that is usually available for other functions, such as other productions or even domestic tasks. A mobile application was developed for Android so that the user can control and monitor his system in real time. In the application, it is possible to visualize the data that translate the quality of the water inserted in the tank, as well as perform some actions on the implemented actuators, such as start/stop the irrigation system and pour the water in case of poor water quality. The implemented system translates a simple solution with a high level of efficiency and tests and results obtained within the possible environment.

Keywords: internet of things, irrigation system, wireless sensor and actuator network, ESP32, sustainability, water reuse, water efficiency

Procedia PDF Downloads 108
1425 Internet of Things as a Source of Opportunities for Entrepreneurs

Authors: Svetlana Gudkova

Abstract:

The Internet of Things experiences a rapid growth bringing inevitable changes into many spheres of human activities. As the Internet has changed the social and business landscape, IoT as its extension, can bring much more profound changes in economic value creation and competitiveness of the economies. It has been already recognized as the next industrial revolution. However, the development of IoT is in a great extent stimulated by the entrepreneurial activity. To expand and reach its full potential it requires proactive entrepreneurs, who explore the potential and create innovative ideas pushing the boundaries of IoT technologies' application further. The goal of the research is to analyze, how entrepreneurs utilize the opportunities created by IoT and how do they stimulate the development of IoT through discovering of new ways of generating economic value and creating opportunities, which attract other entrepreneurs. The qualitative research methods have been applied to prepare the case studies. Entrepreneurs are recognized as an engine of economic growth. They introduce innovative products and services into the market through the creation of a new combination of the existing resources and utilizing new knowledge. Entrepreneurs not only create economic value but what is more important, they challenge the existing business models and invent new ways of value creation. Through identification and exploitation of entrepreneurial opportunities, they create new opportunities for other entrepreneurs. It makes the industry more attractive to other profit/innovation-driven start-ups. IoT creates numerous opportunities for entrepreneurs in the different industries. Smart cities, healthcare, manufacturing, retail, agriculture, smart vehicles and smart buildings benefit a lot from IoT-based breakthrough innovations introduced by entrepreneurs. They reinvented successfully the business models and created new entrepreneurial opportunities for other start-ups to introduce next innovations.

Keywords: entrepreneurship, internet of things, breakthrough innovations, start-ups

Procedia PDF Downloads 158
1424 A Study of Issues and Mitigations on Distributed Denial of Service and Medical Internet of Things Devices

Authors: Robin Singh, Jing-Chiou Liou

Abstract:

The Internet of Things (IoT) devices are being used heavily as part of our everyday routines. Through improved communication and automated procedures, its popularity has assisted users in raising the quality of work. These devices are used in healthcare in order to better collect the patient’s data for their treatment. They are generally considered safe and secure. However, there is some possibility that some loopholes do exist which manufacturers do need to identify before some hacker takes advantage of them. For this study, we focused on two medical IoT devices which are pacemakers and hearing aids. The aim of this paper is to identify if there is any likelihood of these medical devices being hijacked and used as a botnet in Distributed Denial-Of Service attacks. Moreover, some mitigation strategies are being proposed to better secure

Keywords: cybersecurity, DDoS, IoT, medical devices

Procedia PDF Downloads 45
1423 Lightweight Cryptographically Generated Address for IPv6 Neighbor Discovery

Authors: Amjed Sid Ahmed, Rosilah Hassan, Nor Effendy Othman

Abstract:

Limited functioning of the Internet Protocol version 4 (IPv4) has necessitated the development of the Internetworking Protocol next generation (IPng) to curb the challenges. Indeed, the IPng is also referred to as the Internet Protocol version 6 (IPv6) and includes the Neighbor Discovery Protocol (NDP). The latter performs the role of Address Auto-configuration, Router Discovery (RD), and Neighbor Discovery (ND). Furthermore, the role of the NDP entails redirecting the service, detecting the duplicate address, and detecting the unreachable services. Despite the fact that there is an NDP’s assumption regarding the existence of trust the links’ nodes, several crucial attacks may affect the Protocol. Internet Engineering Task Force (IETF) therefore has recommended implementation of Secure Neighbor Discovery Protocol (SEND) to tackle safety issues in NDP. The SEND protocol is mainly used for validation of address rights, malicious response inhibiting techniques and finally router certification procedures. For routine running of these tasks, SEND utilizes on the following options, Cryptographically Generated Address (CGA), RSA Signature, Nonce and Timestamp option. CGA is produced at extra high costs making it the most notable disadvantage of SEND. In this paper a clear description of the constituents of CGA, its operation and also recommendations for improvements in its generation are given.

Keywords: CGA, IPv6, NDP, SEND

Procedia PDF Downloads 349
1422 Determining the Information Technologies Usage and Learning Preferences of Construction

Authors: Naci Büyükkaracığan, Yıldırım Akyol

Abstract:

Information technology is called the technology which provides transmission of information elsewhere regardless of time, location, distance. Today, information technology is providing the occurrence of ground breaking changes in all areas of our daily lives. Information can be reached quickly to millions of people with help of information technology. In this Study, effects of information technology on students for educations and their learning preferences were demonstrated with using data obtained from questionnaires administered to students of 2015-2016 academic year at Selcuk University Kadınhanı Faik İçil Vocational School Construction Department. The data was obtained by questionnaire consisting of 30 questions that was prepared by the researchers. SPSS 21.00 package programme was used for statistical analysis of data. Chi-square tests, Mann-Whitney U test, Kruskal-Wallis and Kolmogorov-Smirnov tests were used in the data analysis for Descriptiving statistics. In a study conducted with the participation of 61 students, 93.4% of students' reputation of their own information communication device (computer, smart phone, etc.) That have been shown to be at the same rate and to the internet. These are just a computer of itself, then 45.90% of the students. The main reasons for the students' use of the Internet, social networking sites are 85.24%, 13.11% following the news of the site, as seen. All student assignments in information technology, have stated that they use in the preparation of the project. When students acquire scientific knowledge in the profession regarding their preferred sources evaluated were seen exactly when their preferred internet. Male students showed that daily use of information technology while compared to female students was statistically significantly less. Construction Package program where students are eager to learn about the reputation of 72.13% and 91.80% identified in the well which they agreed that an indispensable element in the professional advancement of information technology.

Keywords: information technologies, computer, construction, internet, learning systems

Procedia PDF Downloads 259
1421 WebGIS Development Framework With Prioritized Usability Elements

Authors: Ezekiel Mwangi, Stephen Kimani, Agnes Mindila

Abstract:

Usability is one of the key factors that determine the success or failure of any WebGIS (technology normally applied on the internet to analyze and present spatial data on the Internet). However, not all the usability attributes have the same impact on usability. It is, therefore, necessary to prioritize WebGIS usability elements and determine the ones that are more crucial to the success of the WebGIS. This research aims to identify the main elements of WebGIS usability, investigate the order of importance and priority of the usability elements of WebGIS, and propose a WebGIS development framework that incorporates the prioritization of the usability elements. This will be achieved through a literature review. The outcome of this research will help usability specialists and WebGIS developers in determining specific usability elements that should be accorded more emphasis during the design and development of WebGIS.

Keywords: framework, prioritization, usability, WebGIS

Procedia PDF Downloads 115
1420 The Driving Force for Taiwan Social Innovation Business Model Transformation: A Case Study of Social Innovation Internet Celebrity Training Project

Authors: Shih-Jie Ma, Jui-Hsu Hsiao, Ming-Ying Hsieh, Shin-Yan Yang, Chun-Han Yeh, Kuo-Chun Su

Abstract:

In Taiwan, social enterprises and non-profit organizations (NPOs) are not familiar with innovative business models, such as live streaming. In 2019, a brand new course called internet celebrity training project is introduced to them by the Social Innovation Lab. The Goal of this paper is to evaluate the effect of this project, to explore the role of new technology (internet live stream) in business process management (BPM), and to analyze how live stream programs can assist social enterprises in creating new business models. Social Innovation, with the purpose to solve social issues in innovative ways, is one of the most popular topics in the world. Social Innovation Lab was established in 2017 by Executive Yuan in Taiwan. The vision of Social Innovation Lab is to exploit technology, innovation and experimental methods to solve social issues, and to maximize the benefits from government investment. Social Innovation Lab aims at creating a platform for both supply and demand sides of social issues, to make social enterprises and start-ups communicate with each other, and to build an eco-system in which stakeholders can make a social impact. Social Innovation Lab keeps helping social enterprises and NPOs to gain better publicity and to enhance competitiveness by facilitating digital transformation. In this project, Social Innovation Lab exerted the influence of social media such as YouTube and Facebook, to make social enterprises and start-ups adjust their business models by using the live stream of social media, which becomes one of the tools to expand their market and diversify their sales channels. Internet live stream training courses were delivered in different regions of Taiwan in 2019, including Taitung, Taichung, Kaohsiung and Hualien. Through these courses, potential groups and enterprises were cultivated to become so-called internet celebrities. With their concern about social issues in mind, these internet celebrities know how to manipulate social media to make a social impact in different fields, such as aboriginal people, food and agriculture, LOHAS (Lifestyles of Health and Sustainability), environmental protection and senior citizens. Participants of live stream training courses in Taiwan are selected to take in-depth interviews and questionnaire surveys. Results indicate that the digital transformation process of social enterprises and NPOs can be successful by implementing business process reengineering, a significant change made by social innovation internet celebrities. Therefore, this project can be the new driving force to facilitate the business model transformation in Taiwan.

Keywords: business process management, digital transformation, live stream, social innovation

Procedia PDF Downloads 95
1419 Assessment of E-learning Facilities and Information Need by Open and Distance Learning Students in Jalingo, Nigeria

Authors: R. M. Bashir, Sabo Elizabeth

Abstract:

Electronic learning is an increasingly popular learning approach in higher educational institutions due to vast growth of internet technology. An investigation on the assessment of e-learning facilities and information need by open and distance learning students in Jalingo, Nigeria was conducted. Structured questionnaires were administered to 70 students of the university. Information sourced from the respondents covered demographic, economic and institutional variables. Data collected for demographic variables were computed as frequency count and percentages. Information on assessment of e-learning facilities and information need among open and distance learning students was computed on a three or four point Likert Rating Scale. Findings indicated that there are more men compared to women, a large proportion of the respondents are married and there are more matured students. A high proportion of the students obtained qualifications higher than the secondary school certificate. The proportion of computer literate students was higher compared with those students that owned a computer. Inadequate e-books and reference materials, internet gadgets and inadequate books (hard copies) and reference material are factors that limit utilization of e-learning facilities. Inadequate computer facilities caused delay in examination schedule at the study center. Open and distance learning students required to a high extent information on university timetable and schedule of activities, books (hard and e-books) and reference materials and contact with course coordinators via internet for better learning and academic performance.

Keywords: open and distance learning, information required, electronic books, internet gadgets, Likert scale test

Procedia PDF Downloads 253
1418 Progress and Challenges of Smart Cities in India: An Exploratory Study

Authors: Sushil K. Sharma, Jeff Zhang, Saeed Tabar

Abstract:

Worldwide, several governments are utilizing the Internet of Things (IoT) and other information and communication technologies (ICTs) to create smart city infrastructures to improve both the quality of government services and citizen welfare. Over 700 cities from around the world have already started implementing their smart city projects. Smart City utilizes the network of connected things, or the Internet of Things (IoT), that interconnects devices and various components across city infrastructure, making them work together seamlessly to enhance the quality, performance, and interactivity of urban services, optimize resources, and reduce costs. Without developing smart cities, the accelerating growth of cities, and their disproportionate consumption of physical and social resources are unsustainable. In 2016, the Indian Government released a list of 100 cities with the intention of kick-starting the process of developing them into 'smart cities’ as part of the Smart Cities Mission. This study reports the progress and challenges of Smart City projects in India. The data were collected through the city/state government websites, media reports, and focus group discussions/interviews. The preliminary results indicate that smart city projects are not only behind in their implementation and scope but also lacks the sincerity for its implementation.

Keywords: smart city, smart government, Internet of Things, digital government

Procedia PDF Downloads 130
1417 Consumer Perception of 3D Body Scanning While Online Shopping for Clothing

Authors: A. Grilec, S. Petrak, M. Mahnic Naglic

Abstract:

Technological development and the globalization in production and sales of clothing in the last decade have significantly influenced the changes in consumer relationship with the industrial-fashioned apparel and in the way of clothing purchasing. The Internet sale of clothing is in a constant and significant increase in the global market, but the possibilities offered by modern computing technologies in the customization segment are not yet fully involved, especially according to the individual customer requirements and body sizes. Considering the growing trend of online shopping, the main goal of this paper is to investigate the differences in customer perceptions towards online apparel shopping and particularly to discover the main differences in perceptions between customers regarding three different body sizes. In order to complete the research goal, the quantitative study on the sample of 85 Croatian consumers was conducted in 2017 in Zagreb, Croatia. Respondents were asked to indicate their level of agreement according to a five-point Likert scale ranging from strongly disagree (1) to strongly agree (5). To analyze attitudes of respondents, simple and descriptive statistics were used. The main findings highlight the differences in respondent perception of 3D body scanning, using 3D body scanning in Internet shopping, online apparel shopping habits regarding their body sizes.

Keywords: consumer behavior, Internet, 3D body scanning, body types

Procedia PDF Downloads 117
1416 Analysis of Spamming Threats and Some Possible Solutions for Online Social Networking Sites (OSNS)

Authors: Dilip Singh Sisodia, Shrish Verma

Abstract:

Spamming is the most common issue seen nowadays in the Internet especially in Online Social Networking Sites (like Facebook, Twitter, and Google+ etc.). Spam messages keep wasting Internet bandwidth and the storage space of servers. On social network sites; spammers often disguise themselves by creating fake accounts and hijacking user’s accounts for personal gains. They behave like normal user and they continue to change their spamming strategy. To prevent this, most modern spam-filtering solutions are deployed on the receiver side; they are good at filtering spam for end users. In this paper we are presenting some spamming techniques their behaviour and possible solutions. We have analyzed how Spammers enters into online social networking sites (OSNSs) and how they target it and the techniques they use for it. The five discussed techniques of spamming techniques which are clickjacking, social engineered attacks, cross site scripting, URL shortening, and drive by download. We have used elgg framework for demonstration of some of spamming threats and respective implementation of solutions.

Keywords: online social networking sites, spam, attacks, internet, clickjacking / likejacking, drive-by-download, URL shortening, networking, socially engineered attacks, elgg framework

Procedia PDF Downloads 290
1415 The Role of Intermediaries in E-Government Adoption in India: Bridging the Digital Divide

Authors: Rajiv Kumar, Amit Sachan, Arindam Mukherjee

Abstract:

Despite the transparency and benefits of e-government, and its potential to serve citizens better, there is low diffusion and adoption of e-government services in India. Limited access to computer and internet, lack of computer and internet skills, low trust in technology, and risk associated in using e-government services are major hindrances in e-government adoption in India. Despite a large number of citizens belonging to the non-adopter category, the government has made some services mandatory to be accessed online where citizens have no other choice. Also despite the digital divide, a large number of citizens prefer online access to government services. In such cases intermediaries like common service centers, internet café and services agents’ roles are significant for accessing e-government services. Hence research is needed to explore this. The study aims to investigate the role of intermediaries in online access to public services by citizens. Qualitative research methodology using semi-structured interview was used. The results show that intermediaries play an important role in bridging the digital divide. The study also highlights on what circumstances citizens are taking help of these intermediaries. The study then highlights its limitations and discusses scope for future study.

Keywords: adoption, digital divide, e-government, India, intermediaries

Procedia PDF Downloads 238