Search results for: phone users
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2727

Search results for: phone users

2667 Users’ Preferences for Map Navigation Gestures

Authors: Y. Y. Pang, N. A. Ismail

Abstract:

The map is a powerful and convenient tool in helping us to navigate to different places, but the use of indirect devices often makes its usage cumbersome. This study intends to propose a new map navigation dialogue that uses hand gesture. A set of dialogue was developed from users’ perspective to provide users complete freedom for panning, zooming, rotate, and find direction operations. A participatory design experiment was involved here where one hand gesture and two hand gesture dialogues had been analysed in the forms of hand gestures to develop a set of usable dialogues. The major finding was that users prefer one-hand gesture compared to two-hand gesture in map navigation.

Keywords: hand gesture, map navigation, participatory design, intuitive interaction

Procedia PDF Downloads 249
2666 Utilize 5G Mobile Connection as a Node in the Proof of Authority Blockchain Used for Microtransaction

Authors: Frode van der Laak

Abstract:

The paper contributes to the feasibility of using a 5G mobile connection as a node for a Proof of Authority (PoA) blockchain, which is used for microtransactions at the same time. It uses the phone number identity of the users that are linked to the crypto wallet address. It also proposed a consensus protocol based on Proof-of-Authority (PoA) blockchain; PoA is a permission blockchain where consensus is achieved through a set of designated authority rather than through mining, as is the case with a Proof of Work (PoW) blockchain. This report will first explain the concept of a PoA blockchain and how it works. It will then discuss the potential benefits and challenges of using a 5G mobile connection as a node in such a blockchain, and finally, the main open problem statement and proposed solutions with the requirements.

Keywords: 5G, mobile, connection, node, PoA, blockchain, microtransaction

Procedia PDF Downloads 64
2665 Restraint and Seclusion: Individual and Environmental Characteristics of the Educators Super Users

Authors: Caroline A. Mathieu, Steve Geoffrion, Alexandre Dumais, Denis Lafortune

Abstract:

In Quebec, troubled youths stay in a rehabilitation Center (RC), and educators in RC’S are particularly at risk of exposure to workplace violence. In order to manage youth violence and protect youth safety or their own, educators can resort to restraint and seclusion (R&S) strategies. To our best knowledge, in the literature, no study was found on the topic of R&S super users either in psychiatry or in a rehabilitation center. The objective of this study is to explore the differences between R&S super users and normal users among educators in terms of individual and environmental characteristics, over an eight weeks period. The 278 participants were volunteers recruited from 36 units that foster around 8 to 12 youths per unit, in a suburb of Montreal; Quebec, Canada. The results indicate that among the variables that were studied, only fear of violence and past exposure to violence at work characterized the R&S super users. These results suggest that exposure to violence in the workplace might increase the anticipation and fear of violence from a youth; this is concordant with the results indicating that these variables are the ones separating normal users from super users.

Keywords: seclusion and restraint, violence, youth, educators

Procedia PDF Downloads 144
2664 Design and Implementation of Reliable Location-Based Social Community Services

Authors: B. J. Kim, K. W. Nam, S. J. Lee

Abstract:

Traditional social network services provide users with more information than is needed, and it is not easy to verify the authenticity of the information. This paper proposes a system that can only post messages where users are located to enhance the reliability of social networking services. The proposed system implements a Google Map API to post postings on the map and to read postings within a range of distances from the users’ location. The proposed system will only provide alerts, memories, and information about locations within a given range depending on the users' current location, providing reliable information that they believe will be necessary in real time. It is expected that the proposed system will be able to meet the real demands of users and create a more reliable social network services environment.

Keywords: social network, location, reliability, posting

Procedia PDF Downloads 222
2663 Comparing the Educational Effectiveness of eHealth to Deliver Health Knowledge between Higher Literacy Users and Lower Literacy Users

Authors: Yah-Ling Hung

Abstract:

eHealth is undoubtedly emerging as a promising vehicle to provide information for individual self-care management. However, the accessing ability, reading strategies and navigating behavior between higher literacy users and lower literacy users are significantly different. Yet, ways to tailor audiences’ health literacy and develop appropriate eHealth to feed their need become a big challenge. The purpose of this study is to compare the educational effectiveness of eHealth to deliver health knowledge between higher literacy users and lower literacy users, thus establishing useful design strategies of eHealth for users with different level of health literacy. The study was implemented in four stages, the first of which developed a website as the testing media to introduce health care knowledge relating to children’s allergy. Secondly, a reliability and validity test was conducted to make sure that all of the questions in the questionnaire were good indicators. Thirdly, a pre-post knowledge test was conducted with 66 participants, 33 users with higher literacy and 33 users with lower literacy respectively. Finally, a usability evaluation survey was undertaken to explore the criteria used by users with different levels of health literacy to evaluate eHealth. The results demonstrated that the eHealth Intervention in both groups had a positive outcome. There was no significant difference between the effectiveness of eHealth intervention between users with higher literacy and users with lower literacy. However, the average mean of lower literacy group was marginally higher than the average mean of higher literacy group. The findings also showed that the criteria used to evaluate eHealth could be analyzed in terms of the quality of information, appearance, appeal and interaction, but the users with lower literacy have different evaluation criteria from those with higher literacy. This is an interdisciplinary research which proposes the sequential key steps that incorporate the planning, developing and accessing issues that need to be considered when designing eHealth for patients with varying degrees of health literacy.

Keywords: eHealth, health intervention, health literacy, usability evaluation

Procedia PDF Downloads 109
2662 TRIZ-Based Conflicts-Solving Applications in New Product Development (NPD) Process and Knowledge Management (KM) System

Authors: Chi-Hao Yeh

Abstract:

The aim of this paper is to show how to apply TRIZ to resolve conflicts in management area, which can be readily applied in new product development (NPD) process and Knowledge Management (KM) system in desinging and manfacturing stages. TRIZ has been well-known as a creative and innovative thinking theory in solving engineering and technology contradictions in the last two decades. However, few studies and practical usage were proposed in management area. Conflicts occurring including schedule, budget, and risk plannings at smart phone R&D process are discussed to demonstrate the ideas guided by 39 TRIZ management parameters, 40 TRIZ innovative principles, and contradiction matrix. The results show that TRIZ is able to provide direct, quick and effective alternatives to resolve the management conflicts. In this manner, huge effort and cost can be actually saved and practical experince can be stored in KM system. In this paper, an innovative 3C consuming product such as smart-phone is utilized as a case study to describe the proposed TRIZ-based conflicts-solving approaches in NPD process and Knowledge Management (KM) system.

Keywords: TRIZ, conflicts-solving in managment area, new product development (NPD), knowledge management (KM), smart-phone

Procedia PDF Downloads 474
2661 Optimizing Electric Vehicle Charging with Charging Data Analytics

Authors: Tayyibah Khanam, Mohammad Saad Alam, Sanchari Deb, Yasser Rafat

Abstract:

Electric vehicles are considered as viable replacements to gasoline cars since they help in reducing harmful emissions and stimulate power generation through renewable energy sources, hence contributing to sustainability. However, one of the significant obstacles in the mass deployment of electric vehicles is the charging time anxiety among users and, thus, the subsequent large waiting times for available chargers at charging stations. Data analytics, on the other hand, has revolutionized the decision-making tasks of management and operating systems since its arrival. In this paper, we attempt to optimize the choice of EV charging stations for users in their vicinity by minimizing the time taken to reach the charging stations and the waiting times for available chargers. Time taken to travel to the charging station is calculated by the Google Maps API and the waiting times are predicted by polynomial regression of the historical data stored. The proposed framework utilizes real-time data and historical data from all operating charging stations in the city and assists the user in finding the best suitable charging station for their current situation and can be implemented in a mobile phone application. The algorithm successfully predicts the most optimal choice of a charging station and the minimum required time for various sample data sets.

Keywords: charging data, electric vehicles, machine learning, waiting times

Procedia PDF Downloads 152
2660 The Current Use of Cell Phone in Education

Authors: Elham A. Alsadoon, Hamadah B. Alsadoon

Abstract:

Educators try to design learning environments that are preferred by their students. With the wide-spread adoption of cell phones surpassing any other technology, educators should not fail to invest in the power of such technology. This study aimed to explore the current use of cell phones in education among Saudi students in Saudi universities and how students perceive such use. Data was collected from 237 students at King Saud University. Descriptive analysis was used to analyze the data. A T-test for independent groups was used to examine whether there was a significant difference between males and females in their perception of using cell phones in education. Findings suggested that students have a positive attitude toward the use of cell phones in education. The most accepted use was for sending notification to students, which has already been experienced through the Twasel system provided by King Saud University. This electronic system allows instructors to easily send any SMS or email to their students. The use of cell phone applications came in the second rank of using cell phones in education. Students have already experienced the benefits of having these applications handy wherever they go. On the other hand, they did not perceive using cell phones for assessment as practical educational usage. No gender difference was detected in terms of students’ perceptions toward using cell phones in education.

Keywords: cell phone, mobile learning, educational sciences, education

Procedia PDF Downloads 385
2659 Management Systems as a Tool to Limit the End-Users Impacts on Energy Savings Achievements

Authors: Margarida Plana

Abstract:

The end-users behavior has been identified in the last years as one of the main responsible for the success degree of the energy efficiency improvements. It is essential to create tools to limit their impact on the final consumption. This paper is focused on presenting the results of the analysis developed on the basis of real projects’ data in order to quantify the impact of end-users behavior. The analysis is focused on how the behavior of building’s occupants can vary the achievement of the energy savings targets and how they can be limited. The results obtained show that the management systems are one of the main tools available to control and limit the end-users interaction with the equipment operation. In fact, the results will present the management systems as ‘a must’ on any energy efficiency project.

Keywords: end-users impacts, energy efficiency, energy savings, management systems

Procedia PDF Downloads 235
2658 Attribute Analysis of Quick Response Code Payment Users Using Discriminant Non-negative Matrix Factorization

Authors: Hironori Karachi, Haruka Yamashita

Abstract:

Recently, the system of quick response (QR) code is getting popular. Many companies introduce new QR code payment services and the services are competing with each other to increase the number of users. For increasing the number of users, we should grasp the difference of feature of the demographic information, usage information, and value of users between services. In this study, we conduct an analysis of real-world data provided by Nomura Research Institute including the demographic data of users and information of users’ usages of two services; LINE Pay, and PayPay. For analyzing such data and interpret the feature of them, Nonnegative Matrix Factorization (NMF) is widely used; however, in case of the target data, there is a problem of the missing data. EM-algorithm NMF (EMNMF) to complete unknown values for understanding the feature of the given data presented by matrix shape. Moreover, for comparing the result of the NMF analysis of two matrices, there is Discriminant NMF (DNMF) shows the difference of users features between two matrices. In this study, we combine EMNMF and DNMF and also analyze the target data. As the interpretation, we show the difference of the features of users between LINE Pay and Paypay.

Keywords: data science, non-negative matrix factorization, missing data, quality of services

Procedia PDF Downloads 98
2657 An Analysis of Iranian Social Media Users’ Perceptions of Published Images of Coronavirus Deaths

Authors: Ali Gheshmi

Abstract:

The highest rate of death, after World War II, is due to the Coronavirus epidemic and more than 2 million people have died since the epidemic outbreak in December 2019, so the word “death” is one of the highest frequency words in social media; moreover, the use of social media has grown due to quarantine and successive restrictions and lockdowns. The most important aspects of the approach used by this study include the analysis of Iranian social media users’ reactions to the images of those who died due to Coronavirus, investigating if seeing such images via social media is effective on the users’ perception of the closeness of death, and evaluating the extent to which the fear of Coronavirus death is instrumental in persuading users to observe health protocols or causing mental problems in social media users. Since the goal of this study is to discover how social media users perceive and react to the images of people who died of Coronavirus, the cultural studies approach is used Receipt analysis method and in-depth interviews will be used for collecting data from Iranian users; also, snowball sampling is used in this study. The probable results would show that cyberspace users experience the closeness of “death” more than any time else and to cope with these annoying images, avoid viewing them or if they view, it will lead them to suffer from mental problems.

Keywords: death, receipt analysis method, mental health, social media, Covid-19

Procedia PDF Downloads 123
2656 Independent Encryption Technique for Mobile Voice Calls

Authors: Nael Hirzalla

Abstract:

The legality of some countries or agencies’ acts to spy on personal phone calls of the public became a hot topic to many social groups’ talks. It is believed that this act is considered an invasion to someone’s privacy. Such act may be justified if it is singling out specific cases but to spy without limits is very unacceptable. This paper discusses the needs for not only a simple and light weight technique to secure mobile voice calls but also a technique that is independent from any encryption standard or library. It then presents and tests one encrypting algorithm that is based of frequency scrambling technique to show fair and delay-free process that can be used to protect phone calls from such spying acts.

Keywords: frequency scrambling, mobile applications, real-time voice encryption, spying on calls

Procedia PDF Downloads 439
2655 Family Relationships among Users and Non Users of Social Media

Authors: Sawsan Kamal Kalil El Galad, Heba Shafik Ibrahim Mohamed, Rania Ismail Moussa

Abstract:

New developments in the technological world have made the internet an innovative way for individuals and families to communicate. Social media sites help in fulfilling communication needs and wants of their users. The use of social media may have an effect on the family relation either in a positive or negative manner. This study aimed to investigate the family relationships among users and non users of social media. The study followed a cross- sectional descriptive comparative research design. It was conducted on 360 employees, at Damanhour University in Elbeheira, Egypt. Brief Family Relationship Scale (BFRS) was used to collect the data of this study. The results revealed that the mean score of the social media users is slightly increased in relation to the non users of social media mean score with no significant difference between both groups. It was concluded that using social media for short time has no effect on the family relationship, sitting with family in daily base satisfy the social and emotional needs of its member and enhance family relations. Recommendations encompassed that the time spent on social media should be assessed regularly to prevent being isolated from the family members. Educational programs to increase the parent’s awareness how to deal with their children regarding social media and its risks.

Keywords: social media, family relationships, communication needs, culture

Procedia PDF Downloads 70
2654 Influence of Peripheral Vision Restrictions on the Walking Trajectory When Texting While Walking

Authors: Macky Kato, Takeshi Sato, Mizuki Nakajima

Abstract:

One major problem related to the use of smartphones is texting while simultaneously engaging in other things, resulting in serious road accidents. Apart from texting while driving being one of the most dangerous behaviors, texting while walking is also dangerous because it narrows the pedestrians’ field of vision. However, many of pedestrian text while walking very habitually. Smartphone users often overlook the potential harm associated with this behavior even while crossing roads. The successful texting while walking make them think that they are safe. The purpose of this study is to reveal of the influence of peripheral vision to the stability of walking trajectory with texting while walking. In total, 9 healthy male university students participated in the experiment. Their mean age was 21.4 years, and standard deviation was 0.7 years. They attempted to walk 10 m in three conditions. First one is the control (CTR) condition, with no phone and no restriction. The second one is the texting while walking (TWG) with no restrictions. The third one is restriction condition (PRS), with phone restricted by experimental peripheral goggles. The horizontal distances (HDS) and directions are measured as the scale of horizontal stability. The longitudinal distances (LDS) between the footprints were measured as the scale of the walking rhythm. The results showed that the HDS of the footprints from the straight line increased as the participants walked in the TWG and PRS conditions. In the PRS condition, this tendency was particularly remarkable. In addition, the LDS between the footprints decreased in the order of the CTR, TWG, and PRS conditions. The ANOVA results showed significant differences in the three conditions with respect to HDS. The differences among these conditions showed that the narrowing of the Pedestrian's vision because of smartphone use influences the walking trajectory and rhythm. It can be said that the pedestrians seem to use their peripheral vision marginally on texting while walking. Therefore, we concluded that the texting while walking narrows the peripheral vision so danger to increase the risk of the accidents.

Keywords: peripheral vision, stability, texting while walking, walking trajectory

Procedia PDF Downloads 228
2653 Understanding Ambivalent Behaviors of Social Media Users toward the 'Like' Function: A Social Capital Perspective

Authors: Jung Lee, L. G. Pee

Abstract:

The 'Like' function in social media platforms represents the immediate responses of social media users to postings and other users. A large number of 'likes' is often attributed to fame, agreement, and support from others that many users are proud of and happy with. However, what 'like' implies exactly in social media context is still in discussion. Some argue that it is an accurate parameter of the preferences of social media users, whereas others refute that it is merely an instant reaction that is volatile and vague. To address this gap, this study investigates how social media users perceive the 'like' function and behave differently based on their perceptions. This study posits the following arguments. First, 'like' is interpreted as a quantified form of social capital that resides in social media platforms. This incarnated social capital rationalizes the attraction of people to social media and belief that social media platforms bring benefits to their relationships with others. This social capital is then conceptualized into cognitive and emotive dimensions, where social capital in the cognitive dimension represents the awareness of the 'likes' quantitatively, whereas social capital in the emotive dimension represents the receptions of the 'likes' qualitatively. Finally, the ambivalent perspective of the social media users on 'like' (i.e., social capital) is applied. This view rationalizes why social media users appreciate the reception of 'likes' from others but are aware that those 'likes' can distort the actual responses of other users by sending erroneous signals. The rationale on this ambivalence is based on whether users perceive social media as private or public spheres. When social media is more publicized, the ambivalence is more strongly observed. By combining the ambivalence and dimensionalities of the social capital, four types of social media users with different mechanisms on liking behaviors are identified. To validate this work, a survey with 300 social media users is conducted. The analysis results support most of the hypotheses and confirm that people have ambivalent perceptions on 'like' as a social capital and that perceptions influence behavioral patterns. The implication of the study is clear. First, this study explains why social media users exhibit different behaviors toward 'likes' in social media. Although most of the people believe that the number of 'likes' is the simplest and most frank measure of supports from other social media users, this study introduces the users who do not trust the 'likes' as a stable and reliable parameter of social media. In addition, this study links the concept of social media openness to explain the different behaviors of social media users. Social media openness has theoretical significance because it defines the psychological boundaries of social media from the perspective of users.

Keywords: ambivalent attitude, like function, social capital, social media

Procedia PDF Downloads 200
2652 User’s Susceptibility Factors to Malware Attacks: A Systematic Literature Review

Authors: Awad A. Younis, Elise Stronberg, Shifa Noor

Abstract:

Malware attacks due to end-user vulnerabilities have been noticeably increased in the past few years. Investigating the factors that make an end-user vulnerable to those attacks is critical because they can be utilized to set up proactive strategies such as awareness and education to mitigate the impacts of those attacks. Some existing studies investigated demographic, behavioral, and cultural factors that make an end-user susceptible to malware attacks. However, it has been challenging to draw more general conclusions from individual studies due to the varieties in the type of end-users and different types of malware. Therefore, we conducted a systematic literature review (SLR) of the existing research for end-user susceptibility factors to malware attacks. The results showed while some demographic factors are mostly associated with malware infection regardless of the end users' type, age, and gender are not consistent among the same and different types of end-users. Besides, the association of culture and personality factors with malware infection are consistent in most of the selected studies and for all type of end-users. Moreover, malware infection varies based on age, geographic location, and host types. We propose that future studies should carefully take into consideration the type of end-users because different end users may be exposed to different threats or be targeted based on their user domains’ characteristics. Additionally, as different types of malware use different tactics to trick end-users, taking the malware types into consideration is important.

Keywords: cybersecurity, malware, end-users, demographics, personality, culture, systematic literature review

Procedia PDF Downloads 204
2651 The Impacts of Internal Employees on Brand Building: A Case Study of Cell Phone

Authors: Adnan Gohar

Abstract:

This research work aims the importance of internal employees in the making of a brand (cell phone) through customer satisfaction which basically explains the connection of internal employees with external customers. This research is designed to measure the satisfaction level of internal employees which further connects to the product evolution as a brand leaving a brand image in the eye of the external customer. The main focus is that internal employees are as important as external customers for the uplift of the product resulting in the brand. Internal employees are individual organization employees, vendors, departments, and distributors.

Keywords: brand building, customer satisfaction, internal employees, mobile franchise

Procedia PDF Downloads 224
2650 Advertising Appeals and Cultural Values in Social Media Commercials in Uk, Brasil and India: Cases Study of Nokia and Samsung

Authors: Han Nguyen

Abstract:

The objective of this study is to investigate the impact of culture on advertising appeals in mobile phone industry via social media channel in UK, Brazil and India. Content analysis on Samsung and Nokia commercials in YouTube is conducted. The result indicates that the advertising appeals are both congruent and incongruent with cultural dimensions in UK, Brazil and India. The result suggests that Hofstede and value paradoxes might be the tools to predict the relationship between cultural values and advertising appeals.

Keywords: mobile phone advertising, international advertising, social media advertising.

Procedia PDF Downloads 485
2649 Fears of Strangers: Causes of Anonymity Rejection on Virtual World

Authors: Proud Arunrangsiwed

Abstract:

This research is a collaborative narrative research, which is mixed with issues of selected papers and researcher's experience as an anonymous user on social networking sites. The objective of this research is to understand the reasons of the regular users who reject to contact with anonymous users, and to study the communication traditions used in the selected studies. Anonymous users are rejected by regular users, because of the fear of cyber bully, the fear of unpleasant behaviors, and unwillingness of changing communication norm. The suggestion for future research design is to use longitudinal design or quantitative design; and the theory in rhetorical tradition should be able to help develop a strong trust message.

Keywords: anonymous, anonymity, online identity, trust message, reliability

Procedia PDF Downloads 336
2648 Factors Affecting Expectations and Intentions of University Students in Educational Context

Authors: Davut Disci

Abstract:

Objective: to measure the factors affecting expectations and intentions of using mobile phone in educational contexts by university students, using advanced equations and modeling techniques. Design and Methodology: According to the literature, Mobile Addiction, Parental Surveillance-Safety/Security, Social Relations, and Mobile Behavior are most used terms of defining mobile use of people. Therefore, these variables are tried to be measured to find and estimate their effects on expectations and intentions of using mobile phone in educational context. 421 university students participated in this study and there are 229 Female and 192 Male students. For the purpose of examining the mobile behavior and educational expectations and intentions, a questionnaire is prepared and applied to the participants who had to answer all the questions online. Furthermore, responses to close-ended questions are analyzed by using The Statistical Package for Social Sciences(SPSS) software, reliabilities are measured by Cronbach’s Alpha analysis and hypothesis are examined via using Multiple Regression and Linear Regression analysis and the model is tested with Structural Equation Modeling (SEM) technique which is important for testing the model scientifically. Besides these responses, open-ended questions are taken into consideration. Results: When analyzing data gathered from close-ended questions, it is found that Mobile Addiction, Parental Surveillance, Social Relations and Frequency of Using Mobile Phone Applications are affecting the mobile behavior of the participants in different levels, helping them to use mobile phone in educational context. Moreover, as for open-ended questions, participants stated that they use many mobile applications in their learning environment in terms of contacting with friends, watching educational videos, finding course material via internet. They also agree in that mobile phone brings greater flexibility to their lives. According to the SEM results the model is not evaluated and it can be said that it may be improved to show in SEM besides in multiple regression. Conclusion: This study shows that the specified model can be used by educationalist, school authorities to improve their learning environment.

Keywords: learning technology, instructional technology, mobile learning, technology

Procedia PDF Downloads 430
2647 An Experimental Study of Online Peer-to-Peer Language Learning

Authors: Abrar Al-Hasan

Abstract:

Web 2.0 has significantly increased the amount of information available to users not only about firms and their offerings, but also about the activities of other individuals in their networks and markets. It is widely acknowledged that this increased availability of ‘social’ information, particularly about other individuals, is likely to influence a user’s behavior and choices. However, there are very few systematic studies of how such increased information transparency on the behavior of other users in a focal users’ network influences a focal users’ behavior in the emerging marketplace of online language learning. This study seeks to examine the value and impact of ‘social activities’ – wherein, a user sees and interacts with the learning activities of her peers – on her language learning efficiency. An online experiment in a peer-to-peer language marketplace was conducted to compare the learning efficiency of users with ‘social’ information versus users with no ‘social’ information. The results of this study highlight the impact and importance of ‘social’ information within the language learning context. The study concludes by exploring how these insights may inspire new developments in online education.

Keywords: e-Learning, language learning marketplace, peer-to-peer, social network

Procedia PDF Downloads 356
2646 End-User Behavior: Analysis of Their Role and Impacts on Energy Savings Achievements

Authors: Margarida Plana

Abstract:

End-users behavior has become one of the main aspects to be solved on energy efficiency projects. Especially on the residential sector, the end-users have a direct impact that affects the achievement of energy saving’s targets. This paper is focused on presenting and quantify the impact of end-users behavior on basis of the analysis of real projects’ data. The analysis study which is the role of buiding’s occupants and how their behavior can change the success of energy efficiency projects how to limit their impact. The results obtained show two main conclusions. The first one is easiest to solve: we need to control and limit the end-users interaction with the equipment operation to be able to reach the targets fixed. The second one: as the plugged equipment are increasing exponentially on the residential sector, big efforts of disseminations are needed in order to explain to citizens the impact of their day by day actions through dissemination campaigns.

Keywords: end-users impacts, energy efficiency, energy savings, impact limitations

Procedia PDF Downloads 327
2645 Accidents and Close Call Situations Connected to the Use of Mobile Phones in Working-Age People ≥ 50 Years Old

Authors: Leena Korpinen, Rauno Pääkkönen, Fabriziomaria Gobba

Abstract:

The aim of this paper is to investigate accidents and close call situations connected to the use of mobile phones in working-age people ≥ 50 years old. The paper is part of a cross-sectional study that was carried out in 2002 in 15,000 working-age Finns. The study showed that mobile-phone-related accidents and close call situations, both at work and at leisure, are more common in people under 50 years that in people ≥ 50 years old. However, people under 50 use mobile phones more than those aged ≥ 50.

Keywords: mobile phone, age, accident, close call situation

Procedia PDF Downloads 321
2644 From Over-Tourism to Over-Mobility: Understanting the Mobility of Incoming City Users in Barcelona

Authors: José Antonio Donaire Benito, Konstantina Zerva

Abstract:

Historically, cities have been places where people from many nations and cultures have met and settled together, while population flows and density have had a significant impact on urban dynamics. Cities' high density of social, cultural, business offerings, everyday services, and other amenities not intended for tourists draw not only tourists but a wide range of city users as well. With the coordination of city rhythms and the porosity of the community, city users order and frame their urban experience. From one side, recent literature focuses on the shift in urban tourist experience from 'having' a holiday through 'doing' activities to 'becoming' a local by experiencing a part of daily life. On the other hand, there is a debate on the 'touristification of everyday life', where middle and upper class urban dwellers display attitudes and behaviors that are virtually undistinguishable from those of visitors. With the advent of globalization and technological advances, modern society has undergone a radical transformation that has altered mobility patterns within it, blurring the boundaries between tourism and everyday life, work and leisure, and "hosts" and "guests". Additionally, the presence of other 'temporary city' users, such as commuters, digital nomads, second home owners, and migrants, contributes to a more complex transformation of tourist cities. Moving away from this traditional clear distinction between 'hosts' and 'guests', which represents a more static view of tourism, and moving towards a more liquid narrative of mobility, academics on tourism development are embracing the New Mobilities Paradigm. The latter moves beyond the static structures of the modern world and focuses on the ways in which social entities are made up of people, machines, information, and images in a moving system. In light of this fluid interdependence between tourists and guests, a question arises as to whether overtourism, which is considered as the underlying cause of citizens' perception of a lower urban quality of life, is a fair representation of perceived mobility excessiveness, place consumption disruptiveness, and residents displacement. As a representative example of an overtourism narrative, Barcelona was chosen as a study area for this purpose, focusing on the incoming city users to reflect in depth the variety of people who contribute to mobility flows beyond those residents already have. Several statistical data have been analyzed to determine the number of national and international visitors to Barcelona at some point during the day in 2019. Specifically, tracking data gathered from mobile phone users within the city are combined with tourist surveys, urban mobility data, zenithal data capture, and information about the city's attractions. The paper shows that tourists are only a small part of the different incoming city users that daily enter Barcelona; excursionists, commuters, and metropolitans also contribute to a high mobility flow. Based on the diversity of incoming city users and their place consumption, it seems that the city's urban experience is more likely to be impacted by over-mobility tan over-tourism.

Keywords: city users, density, new mobilities paradigm, over-tourism.

Procedia PDF Downloads 48
2643 Challenges in Multi-Cloud Storage Systems for Mobile Devices

Authors: Rajeev Kumar Bedi, Jaswinder Singh, Sunil Kumar Gupta

Abstract:

The demand for cloud storage is increasing because users want continuous access their data. Cloud Storage revolutionized the way how users access their data. A lot of cloud storage service providers are available as DropBox, G Drive, and providing limited free storage and for extra storage; users have to pay money, which will act as a burden on users. To avoid the issue of limited free storage, the concept of Multi Cloud Storage introduced. In this paper, we will discuss the limitations of existing Multi Cloud Storage systems for mobile devices.

Keywords: cloud storage, data privacy, data security, multi cloud storage, mobile devices

Procedia PDF Downloads 664
2642 Emotions and Message Sharing on the Chinese Microblog

Authors: Yungeng Xie, Cong Liu, Yi Liu, Xuanao Wan

Abstract:

The study aims to explore microblog users’ emotion expression and sharing behaviors on the Chinese microblog (Weibo). The first theme of study analyzed whether microblog emotions impact readers’ message sharing behaviors, specifically, how the strength of emotion (positive and negative) in microblog messages facilitate/inhibit readers’ sharing behaviors. The second theme compared the differences among the three types of microblog users (i.e., verified enterprise users, verified individual users and unverified users) in terms of their profiles and microblog behaviors. A total of 7114 microblog messages about 24 hot public events in China were sampled from Sina Weibo. The first study results show that strength of negative emotions that microblog messages carry significantly increase the possibility of the message being shared. The second study results indicate that there are significant differences across the three types of users in terms of their emotion expression and its influence on microblog behaviors.

Keywords: emotion expression, information diffusion, microblog, sharing

Procedia PDF Downloads 213
2641 Community Forestry Programme through the Local Forest Users Group, Nepal

Authors: Daniyal Neupane

Abstract:

Establishment of community forestry in Nepal is a successful step in the conservation of forests. Community forestry programme through the local forest users group has shown its positive impacts in the society. This paper discusses an overview of the present scenario of the community forestry in Nepal. It describes the brief historical background, some important forest legislations, and organization of forest. The paper also describes the internal conflicts between forest users and district forest offices, and possible resolution. It also suggests some of the aspects of community forestry in which the research needs to be focused for the better management of the forests in Nepal.

Keywords: community forest, conservation of forest, local forest users group, better management, Nepal

Procedia PDF Downloads 276
2640 Meeting User’s Information Need: A Study on the Acceptance of Mobile Library Service at UGM Library

Authors: M. Fikriansyah Wicaksono, Rafael Arief Budiman, M. Very Setiawan

Abstract:

Currently, a wide range of innovative mobile library (M-Library) service is provided for the users in the library. The M-Library service is an innovation that aims to bring the collections of the library to users who currently use their smartphone so often. With M-Library services, it is expected that the users can fulfill their information needs more conveniently and practically. This study aims to find out how users use M-Library services provided by UGM library. This study applied a quantitative approach to investigate how to use the application M-Library. The Technology Acceptance Model (TAM) theory is applied to perform the analysis in terms of perceived usefulness, perceived ease of use, attitude towards behavior, behavioral intention and actual system usage. The results show that overall the users found that the M-Library application is useful to meet their information needs. Such as facilitate user to access e-resources, search UGM library collections, online booking collections, and reminder for returning book.

Keywords: m-library, mobile library services, technology acceptance, library of UGM

Procedia PDF Downloads 200
2639 The Effective Operations Competitive Advantages of Mobile Phone Service Providers across Countries: The Case of Middle East Region

Authors: Yazan Khalid Abed-Allah Migdadi

Abstract:

The aim of this study is identifying the effective operations competitive advantages of mobile phone service providers across countries. All Arab countries in the Middle East region were surveyed except Syria, and 27 out of 31 service providers were surveyed. Data collected from corporations’ annual reports, websites and other professional institutions published sources. Multiple linear regression analysis test was used to identify the relationship between operations competitive advantages and market share. The effective operations competitive advantages were; diversity of offers and service accessibility

Keywords: competitive advantage, mobile telecommunication operations, Middle East, service provider

Procedia PDF Downloads 366
2638 Differences in Motivations for the Use of Facebook between Males and Females

Authors: Arti Bakhshi, Remia Mahajan

Abstract:

Social networking sites have evolved with great pace and India has been no exception. Facebook is the top most rated social networking site (SNS) in India. Though this site is mostly used by younger generations, the popularity of this site is increasing among all masses and classes. The current paper explores gender differences in motivations for the use of Facebook. Of the sample (N=556), 229 male and 327 female Facebook users from India were asked to rate the motivations for the use of Facebook from ‘most preferred’ to ‘least preferred’. The five motivations studied were- time passing, information, relationship development, relationship maintenance and trend following. The cross tab chi square analyses revealed significant differences in three out of five motivations between male and female Facebook users, namely time passing, relationship development and trend following. Female Facebook users rated ‘time passing’ as a more preferred motivation in comparison to male Facebook users, while male users rated ‘relationship development’ and ‘trend following’ motivations as more preferred in comparison to female Facebook users. Suggestions for future research are discussed.

Keywords: facebook, gender, motivations, social networking sites

Procedia PDF Downloads 451